{"id":8686,"date":"2025-01-30T10:31:37","date_gmt":"2025-01-30T10:31:37","guid":{"rendered":"https:\/\/messageflow.com\/?page_id=8686"},"modified":"2025-11-05T08:45:37","modified_gmt":"2025-11-05T08:45:37","slug":"dora_nis2","status":"publish","type":"page","link":"https:\/\/messageflow.com\/pl\/dora_nis2\/","title":{"rendered":"DORA &amp; NIS2"},"content":{"rendered":"<section id=\"acf-block-text-hero-section-block_d4f2f2e161c1b1c772bf96a3e7c2f665\" class=\"text-hero-section big-left-radius position-relative c-pt-only-8 c-pt-lg-only-6  acf-block-text-hero-section  c-mb-only-8 bg-white \">        <div class=\"container\">        <div class=\"row\">            <div class=\"col-12\">                    <span class=\"h6 d-block text-primary-300 text-center\">Nasze zaanga\u017cowanie w cyberbezpiecze\u0144stwo<\/span>        <h1 class=\"h1 c-mt-20px text-primary-900 text-center\">        Cyberbezpiecze\u0144stwo w zgodno\u015bci z NIS2 i DORA    <\/h1>                                        <div class=\"entry-content entry-content--18 fw-medium c-mt-only-5 lh-1-75 text-center text-gray-700\">                        <p>W \u015bwiecie cyfrowej komunikacji niezawodno\u015b\u0107 i bezpiecze\u0144stwo s\u0105 kluczowe. Jako dostawca us\u0142ug ICT dbamy o najwy\u017csz\u0105 jako\u015b\u0107 naszych rozwi\u0105za\u0144 i zapewniamy pe\u0142n\u0105 zgodno\u015b\u0107 z obowi\u0105zuj\u0105cymi regulacjami w zakresie cyberbezpiecze\u0144stwa. Aktywnie dostosowujemy nasze us\u0142ugi do nowych wymaga\u0144 prawnych, w tym:<\/p>                    <\/div>                            <\/div>        <\/div>    <\/div><\/section><section id=\"acf-block-columns-with-form-block_845b58e2b5ac84923682fe0fe5706cf4\" class=\"acf-block-columns-with-form  c-mt-only-8 c-mb-only-8 bg-white   js-columns-with-form\">    <div class=\"container\">        <div class=\"row c-px-xl-only-5 c-row-gap-only-5\">                            <div class=\"col-lg-6 d-flex flex-column justify-content-between align-items-start c-row-gap-only-3 c-px-lg-only-6 c-px-xl-only-7\">                    <div class=\"d-flex flex-column justify-content-start align-items-start c-row-gap-only-3\">                        <object type=\"image\/svg+xml\" data=\"https:\/\/messageflow.com\/wp-content\/uploads\/2024\/12\/Securitycompliance.svg\" class=\"acf-block-columns-with-form__icon\"><\/object>        <h2 class=\"text- text-start fz-32\">        Rozporz\u0105dzenie DORA (2022\/2554)    <\/h2>                                                        <div class=\"d-flex flex-column c-row-gap-only-3 text-gray-700\">                                <p>Reguluj\u0105ce obowi\u0105zki w zakresie cyberbezpiecze\u0144stwa dla podmiot\u00f3w sektora finansowego oraz na zewn\u0119trznych dostawc\u00f3w us\u0142ug ICT.<\/p>                            <\/div>                                            <\/div>                                                        <\/div>                            <div class=\"col-lg-6 d-flex flex-column justify-content-between align-items-start c-row-gap-only-3 c-px-lg-only-6 c-px-xl-only-7 acf-block-columns-with-form__column border-border-gray\">                    <div class=\"d-flex flex-column justify-content-start align-items-start c-row-gap-only-3\">                        <object type=\"image\/svg+xml\" data=\"https:\/\/messageflow.com\/wp-content\/uploads\/2024\/12\/Securitycompliance.svg\" class=\"acf-block-columns-with-form__icon\"><\/object>        <h2 class=\"text- text-start fz-32\">        Dyrektywa NIS2 (2022\/2555)    <\/h2>                                                        <div class=\"d-flex flex-column c-row-gap-only-3 text-gray-700\">                                <p>Zwi\u0119kszaj\u0105ca \u015brodki na rzecz zwi\u0119kszenia poziomu cyberbezpiecze\u0144stwa na terenie Unii Europejskiej. Dotycz\u0105ce ochrony system\u00f3w informacyjnych kluczowych sektor\u00f3w gospodarki.<\/p>                            <\/div>                                            <\/div>                                                        <\/div>                    <\/div>            <\/div><\/section>    <div id=\"acf-block-default-content-block_8dc0ab99efea1811efd82875c9e72e68\" class=\"acf-block-default-content  bg-white text-primary-text  c-mt-5 c-mb-5\">        <div class=\"container\">            <div class=\"entry-content lh-1-75  entry-content--18\">                <h2>Jak dbamy o cyberbezpiecze\u0144stwo?<\/h2><p>W trosce o najwy\u017cszy poziom bezpiecze\u0144stwa naszych us\u0142ug, wprowadzili\u015bmy szereg kluczowych dzia\u0142a\u0144:<\/p>            <\/div>        <\/div>    <\/div><section id=\"acf-block-columns-with-list-block_3d60a0fe3e94b646abef693d25a6ca93\" class=\"acf-block-columns-with-list  c-mt-6 c-mb-6 bg-white\">    <div class=\"container\">        <div class=\"row c-row-gap-only-6 row--spacing-lg-24px\">                            <div class=\"col-lg-6\">                    <div class=\"bg-white rounded-4 d-flex flex-column c-row-gap-only-5 justify-content-between h-100 box-shadow-16-primary-900 c-p-only-5 c-p-md-only-6 c-p-xl-only-7\">                        <div class=\"d-flex flex-column c-row-gap-only-5\">                            <div>                                        <h2 class=\"h4  text-primary-900 text-start acf-block-columns-with-list__heading br-lg-up\">        Bezpiecze\u0144stwo system\u00f3w informacyjnych    <\/h2>                                <\/div>                                <ul class=\"list-with-ticks list-unstyled d-flex flex-column justify-content-start align-items-start fz-18 list-with-ticks--18 fw-normal\">                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Nasza infrastruktura spe\u0142nia wymagania norm ISO 27001, ISO 22301 oraz ISO 27018.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Regularnie przeprowadzamy testy penetracyjne (wewn\u0119trzne i zewn\u0119trzne) w celu identyfikacji podatno\u015bci.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Stosujemy zaawansowane zabezpieczenia kryptograficzne w celu ochrony danych.<\/span>            <\/li>            <\/ul>                        <\/div>                                            <\/div>                <\/div>                            <div class=\"col-lg-6\">                    <div class=\"bg-white rounded-4 d-flex flex-column c-row-gap-only-5 justify-content-between h-100 box-shadow-16-primary-900 c-p-only-5 c-p-md-only-6 c-p-xl-only-7\">                        <div class=\"d-flex flex-column c-row-gap-only-5\">                            <div>                                        <h2 class=\"h4  text-primary-900 text-start acf-block-columns-with-list__heading br-lg-up\">        Zarz\u0105dzanie ryzykiem i incydentami    <\/h2>                                <\/div>                                <ul class=\"list-with-ticks list-unstyled d-flex flex-column justify-content-start align-items-start fz-18 list-with-ticks--18 fw-normal\">                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Prowadzimy kompleksowe zarz\u0105dzanie ryzykiem w zakresie cyberbezpiecze\u0144stwa.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Monitorujemy nasz\u0105 infrastruktur\u0119 24\/7, by natychmiast reagowa\u0107 na potencjalne zagro\u017cenia.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Zarz\u0105dzamy incydentami i podatno\u015bciami zgodnie z najlepszymi praktykami bran\u017cowymi.<\/span>            <\/li>            <\/ul>                        <\/div>                                            <\/div>                <\/div>                            <div class=\"col-lg-6\">                    <div class=\"bg-white rounded-4 d-flex flex-column c-row-gap-only-5 justify-content-between h-100 box-shadow-16-primary-900 c-p-only-5 c-p-md-only-6 c-p-xl-only-7\">                        <div class=\"d-flex flex-column c-row-gap-only-5\">                            <div>                                        <h2 class=\"h4  text-primary-900 text-start acf-block-columns-with-list__heading br-lg-up\">        Bezpiecze\u0144stwo zasob\u00f3w ludzkich    <\/h2>                                <\/div>                                <ul class=\"list-with-ticks list-unstyled d-flex flex-column justify-content-start align-items-start fz-18 list-with-ticks--18 fw-normal\">                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Kontrolujemy dost\u0119p do system\u00f3w i aktyw\u00f3w, dbaj\u0105c o bezpiecze\u0144stwo danych.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Regularnie szkolimy nasz personel w zakresie cyberbezpiecze\u0144stwa, wdra\u017caj\u0105c zasady cyberhigieny oraz security awareness.<\/span>            <\/li>            <\/ul>                        <\/div>                                            <\/div>                <\/div>                            <div class=\"col-lg-6\">                    <div class=\"bg-white rounded-4 d-flex flex-column c-row-gap-only-5 justify-content-between h-100 box-shadow-16-primary-900 c-p-only-5 c-p-md-only-6 c-p-xl-only-7\">                        <div class=\"d-flex flex-column c-row-gap-only-5\">                            <div>                                        <h2 class=\"h4  text-primary-900 text-start acf-block-columns-with-list__heading br-lg-up\">        Ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania i zgodno\u015b\u0107 z DORA    <\/h2>                                <\/div>                                <ul class=\"list-with-ticks list-unstyled d-flex flex-column justify-content-start align-items-start fz-18 list-with-ticks--18 fw-normal\">                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Zapewniamy plany ci\u0105g\u0142o\u015bci dzia\u0142ania oraz gwarantowane poziomy us\u0142ug (SLA).<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Wspieramy Klient\u00f3w w dostosowaniu si\u0119 do wymaga\u0144 DORA poprzez dedykowane umowy o \u015bwiadczenie us\u0142ug ICT.<\/span>            <\/li>                    <li class=\"list-with-ticks__item position-relative\">                                <span class=\"text-gray-700\">Opracowali\u015bmy wz\u00f3r aneksu do um\u00f3w, oparty na rekomendacjach Zwi\u0105zku Bank\u00f3w Polskich.<\/span>            <\/li>            <\/ul>                        <\/div>                                            <\/div>                <\/div>                    <\/div>    <\/div><\/section><section id=\"acf-block-call-to-action-with-small-image-block_3200822e581160ae49276a856bc75608\" class=\"acf-block-call-to-action-with-small-image    bg-gray-50 c-pt-only-8 c-pb-only-8\" >    <div class=\"container d-flex flex-column align-items-center justify-content-center\">        <div class=\"col-md-9 col-lg-7 d-flex flex-column align-items-center justify-content-center c-row-gap-only-5 text-center\">                        <div class=\"d-flex flex-column gap-12px\">                        <h2 class=\"h5  text-primary-900 text-center\">        Zapoznaj si\u0119 ze wzorem aneksu do umowy o \u015bwiadczenie us\u0142ug ICT.    <\/h2>                                            <\/div>                        <div class=\"d-flex c-column-gap-only-4 c-row-gap-only-3 align-items-center flex-wrap justify-content-center\">                        <div class=\"crunch-button-wrapper c-mt-0\">            <a href=\"https:\/\/messageflow.com\/wp-content\/uploads\/2026\/02\/Aneks-Dora-_-wzor-PL-02.2026.pdf\" class=\"crunch-button crunch-button__full-background crunch-button__full-background--accent-yellow-color crunch-button__full-background--medium\" target=\"_blank\" rel=\"nofollow\">Zobacz aneks<\/a>        <\/div>                                <\/div>        <\/div>    <\/div><\/section><section id=\"acf-block-text-call-to-action-with-logo-block_af1a0b4f6a1699b0fee2c6a784acf76a\" class=\"text-call-to-action-with-logo acf-block-text-call-to-action-with-logo  c-pt-only-8 c-pb-only-8 bg-primary-900\">    <div class=\"container\">        <div class=\"row\">            <div class=\"col-lg-8 c-pr-lg-0 d-flex flex-column c-row-gap-only-5\">                                    <a href=\"https:\/\/messageflow.com\/pl\/\"                        class=\"text-call-to-action-with-logo__logo hover-opacity-0-75\">                        <object type=\"image\/svg+xml\" data=\"https:\/\/messageflow.com\/wp-content\/uploads\/2024\/08\/logo-white.svg\" class=\"w-100 h-100 d-block object-fit-cover\"><\/object>                    <\/a>                                        <h2 class=\"h3  text-white text-start\">        Zaufaj dostawcy spe\u0142niaj\u0105cemu <span class=\"text-accent-green-500\">najwy\u017csze standardy bezpiecze\u0144stwa <\/span>    <\/h2>                        <div class=\"d-flex align-items-center gap-3\">                                <div class=\"crunch-button-wrapper c-mt-0\">            <a href=\"https:\/\/messageflow.com\/pl\/zarezerwuj-demo\/\" class=\"crunch-button crunch-button__full-background crunch-button__full-background--accent-yellow-color crunch-button__full-background--medium\" target=\"_self\">Um\u00f3w si\u0119 na demo<\/a>        <\/div>                        <\/div>            <\/div>        <\/div>    <\/div><\/section><div class=\"text-call-to-action-with-logo__decor w-100\"><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8686","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/pages\/8686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/comments?post=8686"}],"version-history":[{"count":13,"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/pages\/8686\/revisions"}],"predecessor-version":[{"id":15717,"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/pages\/8686\/revisions\/15717"}],"wp:attachment":[{"href":"https:\/\/messageflow.com\/pl\/wp-json\/wp\/v2\/media?parent=8686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}