{"id":6290,"date":"2025-08-07T11:15:06","date_gmt":"2025-08-07T09:15:06","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6290"},"modified":"2025-08-07T11:18:12","modified_gmt":"2025-08-07T09:18:12","slug":"ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/","title":{"rendered":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1024x536.jpg\" alt=\"BVF cloudov\u00e9 slu\u017eby nahladovy obrazok\" class=\"wp-image-6291\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-760x398.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Mal\u00e9 a stredn\u00e9 firmy sa \u010doraz viac spoliehaj\u00fa na rie\u0161enia typu Software as a Service (SaaS) na zefekt\u00edvnenie svojich \u010dinnost\u00ed. Od spr\u00e1vy z\u00e1kazn\u00edkov po n\u00e1stroje na spolupr\u00e1cu, cloudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy, ktor\u00fdm musia organiz\u00e1cie \u010deli\u0165, aby ochr\u00e1nili citliv\u00e9 \u00fadaje, dodr\u017eali regula\u010dn\u00e9 po\u017eiadavky a zachovali si d\u00f4veru z\u00e1kazn\u00edkov.<\/em><\/p>\n\n\n\n<p>Prechod z tradi\u010dn\u00e9ho lok\u00e1lneho softv\u00e9ru na cloudov\u00e9 slu\u017eby men\u00ed sp\u00f4sob, ak\u00fdm firmy spravuj\u00fa a zabezpe\u010duj\u00fa svoje \u00fadaje. Pre mal\u00e9 a stredn\u00e9 spolo\u010dnosti m\u00f4\u017ee by\u0165 t\u00e1to zmena sk\u013eu\u010duj\u00faca. Mnoh\u00e9 z nich nemaj\u00fa rozsiahle IT zdroje a rozpo\u010dty v\u00e4\u010d\u0161\u00edch podnikov, napriek tomu \u010delia v\u00fdznamn\u00fdm rizik\u00e1m: poru\u0161eniu bezpe\u010dnosti \u00fadajov, vn\u00fatorn\u00fdm hrozb\u00e1m, poru\u0161eniu predpisov a rast\u00facej vlne kybernetick\u00fdch \u00fatokov zameran\u00fdch na cloudov\u00e9 prostredia.<\/p>\n\n\n\n<p>Napriek t\u00fdmto v\u00fdzvam je mo\u017en\u00e9 zabezpe\u010di\u0165 prostredia SaaS a dosiahnu\u0165 s\u00falad s predpismi bez nadmern\u00fdch n\u00e1kladov \u2013 prostredn\u00edctvom inteligentnej kombin\u00e1cie osved\u010den\u00fdch postupov, partnerstiev s dod\u00e1vate\u013emi a vyu\u017eitia integrovan\u00fdch bezpe\u010dnostn\u00fdch funkci\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Firmy spoluzodpovedaj\u00fa za bezpe\u010dnos\u0165 cloudov\u00fdch prostred\u00ed<\/h2>\n\n\n\n<p>Mnoh\u00e9 firmy si mylne myslia, \u017ee zabezpe\u010denie cloudov\u00fdch slu\u017eieb je v\u00fdlu\u010dne zodpovednos\u0165ou ich dod\u00e1vate\u013eov. V&nbsp;skuto\u010dnosti je v\u0161ak bezpe\u010dnos\u0165 cloudov\u00fdch prostred\u00ed spolo\u010dnou zodpovednos\u0165ou: dod\u00e1vate\u013e SaaS poskytuje infra\u0161trukt\u00faru, vr\u00e1tane prvkov zabezpe\u010denia navrhnut\u00fdch pri vytv\u00e1ran\u00ed aplik\u00e1cie, zatia\u013e \u010do z\u00e1kazn\u00edk spravuje pr\u00edstup pou\u017e\u00edvate\u013eov, spr\u00e1vu \u00fadajov, bezpe\u010dnos\u0165 a z\u00e1sady dodr\u017eiavania predpisov. Pre mal\u00e9 a stredn\u00e9 firmy je pochopenie tohto zdie\u013ean\u00e9ho modelu zodpovednosti kritick\u00e9, preto\u017ee nespr\u00e1vna konfigur\u00e1cia alebo slab\u00e1 kontrola pr\u00edstupu ich m\u00f4\u017ee vystavi\u0165 riziku.<\/p>\n\n\n\n<p>Kybernetick\u00e9 hrozby zameran\u00e9 na tretie strany a platformy SaaS s\u00fa \u010doraz sofistikovanej\u0161ie. Medzi najv\u00fdznamnej\u0161ie patria \u00fatoky na dod\u00e1vate\u013esk\u00fd re\u0165azec softv\u00e9ru, pri ktor\u00fdch sa do legit\u00edmneho softv\u00e9ru alebo aktualiz\u00e1ci\u00ed vklad\u00e1 \u0161kodliv\u00fd k\u00f3d. Ke\u010f s\u00fa tieto \u00fatoky cielen\u00e9, m\u00f4\u017eu sa \u0161\u00edri\u0165 medzi obchodn\u00fdmi partnermi prostredn\u00edctvom r\u00f4znych typov aplik\u00e1ci\u00ed, napr\u00edklad \u00fa\u010dtovn\u00fdch, CRM syst\u00e9mov alebo n\u00e1strojov na vzdialen\u00fa spr\u00e1vu.<\/p>\n\n\n\n<p>Dopady sa zvy\u010dajne prejavuj\u00fa ako naru\u0161enie bezpe\u010dnosti \u00fadajov sp\u00f4soben\u00e9 kompromitovan\u00edm prihlasovac\u00edch \u00fadajov alebo zneu\u017eit\u00edm zranite\u013enost\u00ed softv\u00e9ru. Medzi \u010fal\u0161ie be\u017en\u00e9 rizik\u00e1 patria vn\u00fatorn\u00e9 hrozby zo strany nedbanliv\u00fdch alebo \u0161kodliv\u00fdch zamestnancov, kr\u00e1de\u017e \u00fa\u010dtov prostredn\u00edctvom phishingu a \u00fatoky typu credential stuffing. Navy\u0161e, tie\u0148ov\u00e9 IT, v ktorom zamestnanci pou\u017e\u00edvaj\u00fa neautorizovan\u00e9 cloudov\u00e9 n\u00e1stroje, vr\u00e1tane neschv\u00e1len\u00fdch n\u00e1strojov GenAI, m\u00f4\u017eu ohrozi\u0165 d\u00f4vern\u00e9 inform\u00e1cie. Integr\u00e1cia viacer\u00fdch aplik\u00e1ci\u00ed SaaS bez ucelenej bezpe\u010dnostnej strat\u00e9gie \u010falej zvy\u0161uje riziko \u00fatoku a komplikuje snahy o dosiahnutie s\u00faladu s predpismi.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-1024x536.jpg\" alt=\"\" class=\"wp-image-6042\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628-760x398.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/10\/banner_EPP_1200x628.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Dodr\u017eiavanie predpisov prid\u00e1va \u010fal\u0161iu \u00farove\u0148 zlo\u017eitosti. Mal\u00e9 a stredn\u00e9 firmy p\u00f4sobiace v regulovan\u00fdch odvetviach musia dodr\u017eiava\u0165 nariadenia GDPR, HIPAA alebo PCI DSS a musia zabezpe\u010di\u0165, aby ich vyu\u017e\u00edvanie cloudu sp\u013a\u0148alo z\u00e1konn\u00e9 po\u017eiadavky. K t\u00fdmto predpisom sa prid\u00e1va norma ISO\/IEC 27017, ktor\u00e1 poskytuje usmernenia pre kontrolu informa\u010dnej bezpe\u010dnosti cloudov\u00fdch slu\u017eieb, a norma ISO 27018, ktor\u00e1 pon\u00faka k\u00f3dex postupov na ochranu osobn\u00fdch identifika\u010dn\u00fdch \u00fadajov (PII) vo verejn\u00fdch cloudov\u00fdch prostrediach. Tieto normy umo\u017e\u0148uj\u00fa \u00fazku spolupr\u00e1cu s dod\u00e1vate\u013emi SaaS v oblasti umiestnenia \u00fadajov, pravidiel spracovania a implement\u00e1cie potrebn\u00fdch kontroln\u00fdch mechanizmov, aby sa predi\u0161lo pokut\u00e1m a po\u0161kodeniu reput\u00e1cie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cenovo v\u00fdhodn\u00e9 strat\u00e9gie zabezpe\u010denia pre cloudov\u00e9 slu\u017eby<\/h2>\n\n\n\n<p>Napriek rizik\u00e1m nemusia mal\u00e9 a stredn\u00e9 firmy investova\u0165 do drah\u00fdch podnikov\u00fdch bezpe\u010dnostn\u00fdch platforiem, aby \u00fa\u010dinne chr\u00e1nili svoje prostredia SaaS. V\u010faka strategick\u00e9mu pr\u00edstupu, rie\u0161eniam prisp\u00f4soben\u00fdm potreb\u00e1m mal\u00fdch a stredn\u00fdch firiem a spr\u00e1vnemu vyu\u017e\u00edvaniu nat\u00edvnych bezpe\u010dnostn\u00fdch funkci\u00ed m\u00f4\u017eu vybudova\u0165 siln\u00fa obranu v r\u00e1mci zvl\u00e1dnute\u013en\u00fdch rozpo\u010dtov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spr\u00e1va ident\u00edt a pr\u00edstupu (IAM) je mimoriadne d\u00f4le\u017eit\u00e1<\/h2>\n\n\n\n<p>Ke\u010f\u017ee pr\u00edstupov\u00e9 \u00fadaje s\u00fa \u010dasto prim\u00e1rnym cie\u013eom \u00fato\u010dn\u00edkov, implement\u00e1cia viacfaktorovej autentiz\u00e1cie (MFA) zni\u017euje riziko neopr\u00e1vnen\u00e9ho vstupu. Modely zero-trust, ktor\u00e9 nepretr\u017eite overuj\u00fa ka\u017ed\u00e9ho pou\u017e\u00edvate\u013ea a zariadenie, sa stali takmer \u0161tandardom. T\u00e1to kontrola pr\u00edstupu na z\u00e1klade rol\u00ed obmedzuje mo\u017enosti pou\u017e\u00edvate\u013eov na z\u00e1klade ich pracovn\u00fdch rol\u00ed, \u010d\u00edm zabra\u0148uje neopr\u00e1vnen\u00e9mu pr\u00edstupu k citliv\u00fdm \u00fadajom. Rie\u0161enia jednotn\u00e9ho prihl\u00e1senia (SSO) tie\u017e zefekt\u00edv\u0148uj\u00fa autentiz\u00e1ciu vo viacer\u00fdch aplik\u00e1ci\u00e1ch SaaS, \u010d\u00edm zjednodu\u0161uj\u00fa spr\u00e1vu pou\u017e\u00edvate\u013eov a vynucovanie bezpe\u010dnosti. Pravideln\u00e9 kontroly opr\u00e1vnen\u00ed pou\u017e\u00edvate\u013eov zabezpe\u010duj\u00fa, \u017ee pr\u00edstup zost\u00e1va primeran\u00fd aj pri zmene rol\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u0160ifrovanie chr\u00e1ni d\u00f4vernos\u0165 a integritu \u00fadajov<\/h2>\n\n\n\n<p>V\u00e4\u010d\u0161ina poskytovate\u013eov SaaS pon\u00faka \u0161ifrovanie \u00fadajov v pokoji a po\u010das prenosu, ale mal\u00e9 a stredn\u00e9 podniky by mali overi\u0165, \u010di tieto ochrany sp\u013a\u0148aj\u00fa ich \u0161tandardy, a zv\u00e1\u017ei\u0165 dodato\u010dn\u00e9 \u0161ifrovanie na strane klienta pre obzvl\u00e1\u0161\u0165 citliv\u00e9 inform\u00e1cie. Spr\u00e1vne riadenie \u0161ifrovac\u00edch k\u013e\u00fa\u010dov je nevyhnutn\u00e9 na prevenciu bezpe\u010dnostn\u00fdch dier. Pravideln\u00e9 z\u00e1lohovanie v kombin\u00e1cii s overen\u00fdmi postupmi obnovy a&nbsp;n\u00e1strojmi typu ransomware remediation zvy\u0161uj\u00fa odolnos\u0165 proti ransomv\u00e9ru alebo n\u00e1hodnej strate d\u00e1t, rovnako ako implement\u00e1cia strat\u00e9gie prevencie straty d\u00e1t a nasadenie rie\u0161en\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Neust\u00e1le monitorovanie a detekcia hrozieb<\/h2>\n\n\n\n<p>Hoci vybudovanie intern\u00e9ho bezpe\u010dnostn\u00e9ho opera\u010dn\u00e9ho centra (SOC) je n\u00e1kladn\u00e9, mnoh\u00e9 mal\u00e9 a stredn\u00e9 firmy vyu\u017e\u00edvaj\u00fa slu\u017eby poskytovate\u013eov spravovan\u00fdch bezpe\u010dnostn\u00fdch slu\u017eieb (MSSP) alebo cenovo dostupn\u00e9 slu\u017eby riadenej detekcie a&nbsp;reakcie (MDR) na monitorovanie vyu\u017e\u00edvania SaaS a r\u00fdchlu reakciu na incidenty.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zn\u00ed\u017eenie \u013eudsk\u00fdch ch\u00fdb<\/h2>\n\n\n\n<p>\u013dudsk\u00fd faktor zost\u00e1va hlavnou pr\u00ed\u010dinou bezpe\u010dnostn\u00fdch incidentov a je zodpovedn\u00fd a\u017e za 60 % pr\u00edpadov naru\u0161enia bezpe\u010dnosti \u00fadajov. Mal\u00e9 a stredn\u00e9 firmy by mali realizova\u0165 <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/category\/skolenie-kybernetickej-bezpecnosti-pre-zamestnancov\/\"><strong>\u0161kolenia zameran\u00e9 na zvy\u0161ovanie povedomia o kybernetickej bezpe\u010dnosti<\/strong><\/a>, ktor\u00e9 vzdel\u00e1vaj\u00fa zamestnancov o phishingu, soci\u00e1lnom in\u017einierstve a bezpe\u010dn\u00fdch postupoch pri pr\u00e1ci s \u00fadajmi.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">D\u00f4kladn\u00e1 kontrola dod\u00e1vate\u013eov a riadenie dodr\u017eiavania predpisov<\/h2>\n\n\n\n<p>V\u00fdber spr\u00e1vnych dod\u00e1vate\u013eov cloudov\u00fdch slu\u017eieb je k\u013e\u00fa\u010dov\u00fd. Mal\u00e9 a stredn\u00e9 firmy by mali starostlivo vyhodnoti\u0165 bezpe\u010dnostn\u00e9 certifik\u00e1ty dod\u00e1vate\u013eov (napr\u00edklad ISO 27001 alebo SOC 2), dodr\u017eiavanie predpisov v odvetv\u00ed a transparentnos\u0165 bezpe\u010dnostn\u00fdch postupov. Presk\u00famanie doh\u00f4d o \u00farovni slu\u017eieb (SLA) zaru\u010duje splnenie o\u010dak\u00e1van\u00ed v oblasti dostupnosti, reakcie na incidenty a komunik\u00e1cie. Pochopenie modelu zdie\u013eanej zodpovednosti pom\u00e1ha mal\u00fdm a stredn\u00fdm firm\u00e1m vedie\u0165, kde za\u010d\u00ednaj\u00fa a kon\u010dia ich povinnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">K\u013e\u00fa\u010dov\u00fd je s\u00falad s predpismi<\/h2>\n\n\n\n<p>S\u00falad s predpismi nie je jednorazov\u00e1 \u00faloha, ale priebe\u017en\u00fd proces. Mal\u00e9 a stredn\u00e9 firmy by mali dokumentova\u0165 toky \u00fadajov, implementova\u0165 kontroly na splnenie regula\u010dn\u00fdch po\u017eiadaviek a pravidelne kontrolova\u0165 svoje bezpe\u010dnostn\u00e9 opatrenia. N\u00e1stroje na riadenie s\u00faladu s predpismi m\u00f4\u017eu tieto \u00falohy zjednodu\u0161i\u0165 automatiz\u00e1ciou pod\u00e1vania spr\u00e1v a monitorovania.<\/p>\n\n\n\n<p>Po\u010das cel\u00e9ho procesu m\u00f4\u017eu mal\u00e9 a stredn\u00e9 firmy vyu\u017e\u00edva\u0165 slu\u017eby d\u00f4veryhodn\u00fdch <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/male-a-stredne-velke-firmy\/\"><strong>dod\u00e1vate\u013eov bezpe\u010dnostn\u00fdch rie\u0161en\u00ed<\/strong><\/a>, ktor\u00e9 s\u00fa navrhnut\u00e9 pre organiz\u00e1cie v\u0161etk\u00fdch ve\u013ekost\u00ed s d\u00f4razom na jednoduchos\u0165 pou\u017eitia, cenov\u00fa dostupnos\u0165 a komplexn\u00fa ochranu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Nov\u00e9 trendy, ktor\u00e9 by mali mal\u00e9 a stredn\u00e9 firmy sledova\u0165<\/h2>\n\n\n\n<p>Bezpe\u010dnostn\u00e9 technol\u00f3gie sa neust\u00e1le vyv\u00edjaj\u00fa a pon\u00fakaj\u00fa mal\u00fdm a stredn\u00fdm firm\u00e1m nov\u00e9 mo\u017enosti, ako n\u00e1kladovo efekt\u00edvne zlep\u0161i\u0165 ochranu SaaS. Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie zlep\u0161uj\u00fa detekciu hrozieb t\u00fdm, \u017ee r\u00fdchlej\u0161ie a presnej\u0161ie odha\u013euj\u00fa anom\u00e1lie. Automatiza\u010dn\u00e9 n\u00e1stroje zjednodu\u0161uj\u00fa riadenie s\u00faladu s predpismi a zni\u017euj\u00fa po\u010det manu\u00e1lnych ch\u00fdb. Technol\u00f3gie na zv\u00fd\u0161enie ochrany s\u00fakromia pom\u00e1haj\u00fa mal\u00fdm a stredn\u00fdm firm\u00e1m spolupracova\u0165 na citliv\u00fdch \u00fadajoch bez ich zbyto\u010dn\u00e9ho odhalenia.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bezpe\u010dnos\u0165 pre cloudov\u00e9 slu\u017eby je dosiahnute\u013en\u00e1<\/h2>\n\n\n\n<p>Vzh\u013eadom na zvy\u0161uj\u00facu sa zlo\u017eitos\u0165 kybernetick\u00fdch hrozieb a spr\u00eds\u0148ovanie po\u017eiadaviek na dodr\u017eiavanie predpisov musia organiz\u00e1cie prija\u0165 proakt\u00edvne opatrenia na ochranu svojich \u00fadajov a udr\u017eanie d\u00f4very. Na\u0161\u0165astie je siln\u00e1 bezpe\u010dnos\u0165 cloudu dosiahnute\u013en\u00e1 aj bez ve\u013ek\u00fdch rozpo\u010dtov, a to zameran\u00edm sa na spr\u00e1vu ident\u00edt, \u0161ifrovanie, nepretr\u017eit\u00e9 monitorovanie, informovanos\u0165 zamestnancov, dobr\u00e9 riadenie procesov a obozretn\u00fd v\u00fdber dod\u00e1vate\u013eov.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mal\u00e9 a stredn\u00e9 firmy sa \u010doraz viac spoliehaj\u00fa na rie\u0161enia typu Software as a Service (SaaS) na zefekt\u00edvnenie svojich \u010dinnost\u00ed. Od spr\u00e1vy z\u00e1kazn\u00edkov po n\u00e1stroje na spolupr\u00e1cu, cloudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy, ktor\u00fdm musia organiz\u00e1cie \u010deli\u0165, aby ochr\u00e1nili citliv\u00e9 \u00fadaje, dodr\u017eali regula\u010dn\u00e9 po\u017eiadavky a zachovali si d\u00f4veru z\u00e1kazn\u00edkov. Prechod&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-6290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET<\/title>\n<meta name=\"description\" content=\"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET\" \/>\n<meta property=\"og:description\" content=\"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-07T09:15:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T09:18:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby\",\"datePublished\":\"2025-08-07T09:15:06+00:00\",\"dateModified\":\"2025-08-07T09:18:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/\"},\"wordCount\":1544,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/08\\\/BVF_banner_1200x628_2025_august_1-1.jpg\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/\",\"name\":\"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/08\\\/BVF_banner_1200x628_2025_august_1-1.jpg\",\"datePublished\":\"2025-08-07T09:15:06+00:00\",\"dateModified\":\"2025-08-07T09:18:12+00:00\",\"description\":\"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/08\\\/BVF_banner_1200x628_2025_august_1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/08\\\/BVF_banner_1200x628_2025_august_1-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"BVF cloudov\u00e9 slu\u017eby ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET","description":"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET","og_description":"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2025-08-07T09:15:06+00:00","article_modified_time":"2025-08-07T09:18:12+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby","datePublished":"2025-08-07T09:15:06+00:00","dateModified":"2025-08-07T09:18:12+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/"},"wordCount":1544,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/","name":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg","datePublished":"2025-08-07T09:15:06+00:00","dateModified":"2025-08-07T09:18:12+00:00","description":"Coudov\u00e9 slu\u017eby sa stali be\u017enou s\u00fa\u010das\u0165ou pracovn\u00fdch procesov. Av\u0161ak spolu s v\u00fdhodami SaaS prich\u00e1dzaj\u00fa aj nov\u00e9 bezpe\u010dnostn\u00e9 v\u00fdzvy.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/08\/BVF_banner_1200x628_2025_august_1-1.jpg","width":1200,"height":628,"caption":"BVF cloudov\u00e9 slu\u017eby ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ako-bezpecne-vyuzivat-vo-firme-cloudove-sluzby\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako bezpe\u010dne vyu\u017e\u00edva\u0165 vo firme cloudov\u00e9 slu\u017eby"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6290"}],"version-history":[{"count":3,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6290\/revisions"}],"predecessor-version":[{"id":6295,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6290\/revisions\/6295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6292"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}