{"id":6336,"date":"2025-09-12T16:10:39","date_gmt":"2025-09-12T14:10:39","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6336"},"modified":"2025-09-12T16:12:44","modified_gmt":"2025-09-12T14:12:44","slug":"ake-nastrahy-sa-skryvaju-v-tieni-shadow-it","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/","title":{"rendered":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1024x576.jpeg\" alt=\"BVF Shadow IT nahladovy obrazok\" class=\"wp-image-6337\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1024x576.jpeg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-300x169.jpeg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-768x432.jpeg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-370x208.jpeg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1170x658.jpeg 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-972x546.jpeg 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-760x428.jpeg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-270x152.jpeg 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it.jpeg 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov.<\/em><\/p>\n\n\n\n<p>Pravdepodobne ste u\u017e po\u010duli o politik\u00e1ch BYOD (Bring Your Own Device), ktor\u00e9 umo\u017e\u0148uj\u00fa zamestnancom pou\u017e\u00edva\u0165 svoje osobn\u00e9 zariadenia na pracovn\u00e9 \u00fa\u010dely. Napriek tomu, \u017ee ide o \u201ecudzie\u201c m\u00e9di\u00e1 vo vn\u00fatornom syst\u00e9me, s\u00fa st\u00e1le pr\u00edsne spravovan\u00e9 a maj\u00fa k\u013e\u00fa\u010dov\u00fd v\u00fdznam pre zachovanie integrity vn\u00fatorn\u00fdch syst\u00e9mov firiem, ktor\u00e9 ich prev\u00e1dzkuj\u00fa.<\/p>\n\n\n\n<p>Zamestnanci vyu\u017e\u00edvaj\u00faci BYOD to \u010dasto nemaj\u00fa radi, okrem in\u00e9ho kv\u00f4li vn\u00edman\u00e9mu naru\u0161eniu s\u00fakromia. Niektor\u00ed preto konaj\u00fa v duchu: \u201e\u010co moji IT pracovn\u00edci nevedia, im neubl\u00ed\u017ei.\u201c Zamestnanci, ktor\u00ed sa rozhodn\u00fa nedodr\u017eiava\u0165 firemn\u00e9 z\u00e1sady, za\u010d\u00ednaj\u00fa pristupova\u0165 k intern\u00fdm sie\u0165am s&nbsp;vlastn\u00fdmi neoveren\u00fdmi zariadeniami, bez toho, aby prem\u00fd\u0161\u013eali o d\u00f4sledkoch.<\/p>\n\n\n\n<p>Tieto zariadenia sa naz\u00fdvaj\u00fa shadow IT, alebo tie\u0148ov\u00e9 IT, a pre mnoh\u00e9 organiz\u00e1cie predstavuj\u00fa bezpe\u010dnostn\u00fa slabinu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co to je shadow IT?<\/h2>\n\n\n\n<p>Shadow IT predstavuje viac ako be\u017en\u00e9 dom\u00e1ce notebooky pripojen\u00e9 k firemn\u00fdm sie\u0165am. V skuto\u010dnosti tento pojem m\u00f4\u017ee zah\u0155\u0148a\u0165 nieko\u013eko r\u00f4znych typov zariaden\u00ed a dokonca aj softv\u00e9rov\u00e9 rie\u0161enia alebo slu\u017eby, ako s\u00fa cloudov\u00e9 \u00falo\u017eisk\u00e1 alebo generat\u00edvni asistenti umelej inteligencie, ktor\u00fdch pou\u017e\u00edvanie bolo n\u00e1hodn\u00fdmi zamestnancami pova\u017eovan\u00e9 za \u201ev poriadku\u201c bez toho, aby po\u017eiadali o povolenie.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-eb2b3f45b9eb45bc36eccb13774ed91c\">Pod\u013ea spolo\u010dnosti <a href=\"https:\/\/blogs.cisco.com\/cloud\/the-shadow-it-dilemma\">Cisco takmer 80 % koncov\u00fdch pou\u017e\u00edvate\u013eov vyu\u017e\u00edva softv\u00e9r<\/a>, ktor\u00fd nebol schv\u00e1len\u00fd IT oddelen\u00edm. Navy\u0161e 83 % IT zamestnancov pou\u017e\u00edva neschv\u00e1len\u00fd softv\u00e9r alebo slu\u017eby.<\/p>\n\n\n\n<p>Pre\u010do? D\u00f4vody s\u00fa viacer\u00e9. Be\u017en\u00ed zamestnanci m\u00f4\u017eu zisti\u0165, \u017ee rie\u0161enia schv\u00e1len\u00e9 spolo\u010dnos\u0165ou nie s\u00fa dostato\u010dne flexibiln\u00e9, aby im pomohli dosiahnu\u0165 zv\u00fd\u0161enie produktivity. \u017diados\u0165 o povolenie na pou\u017e\u00edvanie vo svete roz\u0161\u00edren\u00e9ho bezplatn\u00e9ho softv\u00e9ru sa m\u00f4\u017ee zda\u0165 zd\u013ahav\u00e1.<\/p>\n\n\n\n<p>Podobne aj IT odborn\u00edci m\u00f4\u017eu ma\u0165 pocit, \u017ee ich s\u00fa\u010dasn\u00e9 n\u00e1stroje nie s\u00fa na \u00farovni toho, \u010do je potrebn\u00e9 na zefekt\u00edvnenie ich pr\u00e1ce. To s\u00favis\u00ed aj s pr\u00edkladom BYOD v \u00favode \u2013 spr\u00e1va zariaden\u00ed sa m\u00f4\u017ee niektor\u00fdm zda\u0165 pr\u00edli\u0161 autorit\u00e1rska a m\u00f4\u017eu sa ob\u00e1va\u0165 o svoje s\u00fakromie.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-a2cba4deafa3068f0a1ea98c899722a6\"><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2023-06-05-gartner-identifies-four-myths-obscuring-cybersecuritys-full-value\">\u0160t\u00fadia z roku 2023 uk\u00e1zala<\/a>, \u017ee a\u017e 69 % zamestnancov obch\u00e1dzalo pokyny t\u00fdkaj\u00face sa kybernetickej bezpe\u010dnosti a 74 % bolo ochotn\u00fdch obch\u00e1dza\u0165 pokyny, aby dosiahli obchodn\u00fd cie\u013e.<\/p>\n\n\n\n<p>Za ka\u017edou politikou riadenia riz\u00edk v\u0161ak stoj\u00ed d\u00f4vod, pre\u010do existuje. Neautorizovan\u00e9 zariadenia m\u00f4\u017eu predstavova\u0165 bezpe\u010dnostn\u00e9 riziko, preto\u017ee ich ochrana pravdepodobne nesp\u013a\u0148a firemn\u00e9 \u0161tandardy.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-6535c322d5561dc220e688237d376e07\">Z\u00e1rove\u0148 m\u00f4\u017ee tie\u0148ov\u00e9 IT znamena\u0165 n\u00e1klady presahuj\u00face be\u017en\u00fd rozpo\u010det spolo\u010dnosti, ktor\u00e9 pod\u013ea spr\u00e1v tvoria <a href=\"https:\/\/www.cio.com\/article\/234745\/how-to-eliminate-enterprise-shadow-it.html\">pribli\u017ene 50 % v\u00fddavkov na IT<\/a> vo ve\u013ek\u00fdch podnikoch. Ke\u010f\u017ee tieto v\u00fddavky nie s\u00fa s\u00fa\u010das\u0165ou be\u017en\u00e9ho ro\u010dn\u00e9ho rozpo\u010dtu, pravdepodobne ide o zbyto\u010dn\u00e9 n\u00e1klady.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hrozby tie\u0148ov\u00e9ho IT<\/h2>\n\n\n\n<p>Organiz\u00e1cie zvy\u010dajne pou\u017e\u00edvaj\u00fa viacero rie\u0161en\u00ed alebo slu\u017eieb na ochranu pracovn\u00fdch zariaden\u00ed. Pou\u017e\u00edvaj\u00fa <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/endpoint-security\/\">ESET Endpoint Security<\/a> s&nbsp;n\u00e1strojom ako <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/xdr-rozsirena-detekcia-a-reakcia\/\">ESET Inspect<\/a>, aby lep\u0161ie vizualizovali a kontrolovali svoju poz\u00edciu, a z\u00e1rove\u0148 pou\u017e\u00edvaj\u00fa <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/ochrana-pred-mobilnymi-hrozbami\/\">ESET Mobile Threat Defense<\/a> na pracovn\u00fdch telef\u00f3noch.<\/p>\n\n\n\n<p>V\u00fdsledkom je bezpe\u010dn\u00e9 prostredie, v ktorom tieto rie\u0161enia \u013eahko zachyt\u00e1vaj\u00fa \u0161kodliv\u00e9 aktivity t\u00fdm, \u017ee kontroluj\u00fa nezrovnalosti s\u00favisiace s existuj\u00facimi pravidlami alebo neobvykl\u00fdm spr\u00e1van\u00edm, ako je napr\u00edklad in\u0161tal\u00e1cia podp\u00edsan\u00e9ho zranite\u013en\u00e9ho ovl\u00e1da\u010da zamestnancom (v najhor\u0161om pr\u00edpade znamenaj\u00faceho pr\u00edtomnos\u0165 <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/desifrujeme-pre-vas\/nastroje-na-odstavenie-edr-su-na-vzostupe-ako-sa-branit\/\">n\u00e1stroja EDR killer<\/a>).<\/p>\n\n\n\n<p>Neschv\u00e1len\u00e9 zariadenia nemaj\u00fa ni\u010d z toho: \u017eiadne automatick\u00e9 opravy zranite\u013enost\u00ed, takmer nulov\u00fa ochranu proti pokro\u010dil\u00fdm hrozb\u00e1m v&nbsp;d\u00f4sledku neexistuj\u00faceho pr\u00edstupu k SOC a vo\u013en\u00fd pr\u00edstup k firemn\u00fdm d\u00e1tam pre ka\u017ed\u00e9ho, kto m\u00e1 z\u00e1ujem vykona\u0165 \u00fatok.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-880cbd7c152b717cd401092c875b7e6b\">Navy\u0161e, shadow IT je aj probl\u00e9mom z h\u013eadiska dodr\u017eiavania predpisov, preto\u017ee nemonitorovan\u00e9 aplik\u00e1cie \u010di zariadenia sa s&nbsp;najv\u00e4\u010d\u0161ou pravdepodobnos\u0165ou vynechaj\u00fa po\u010das povinn\u00fdch auditov.<\/p>\n\n\n\n<p>Toto je konkr\u00e9tne ve\u013ek\u00fd probl\u00e9m tie\u0148ov\u00e9ho IT, preto\u017ee zamestnanec m\u00f4\u017ee ve\u013emi \u013eahko prenies\u0165 firemn\u00e9 dokumenty na osobn\u00fd USB k\u013e\u00fa\u010d, nahra\u0165 ich do svojho osobn\u00e9ho cloudu alebo v najhor\u0161om pr\u00edpade zavies\u0165 do firemn\u00fdch siet\u00ed \u0161kodliv\u00fd softv\u00e9r prostredn\u00edctvom kompromitovan\u00e9ho zariadenia. S tak\u00fdmi mo\u017enos\u0165ami sa pravdepodobnos\u0165 incidentu, ktor\u00fd prekvap\u00ed IT person\u00e1l, zvy\u0161uje na \u00fapln\u00fa istotu.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-eb884d2c777ebe4a177e2af983d407d4\">Pod\u013ea <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">spr\u00e1vy IBM Cost of a Data Breach Report z roku 2025<\/a> s\u00fa tie\u0148ov\u00e9 slu\u017eby umelej inteligencie zodpovedn\u00e9 za a\u017e 20 % bezpe\u010dnostn\u00fdch incidentov, \u010d\u00edm sa n\u00e1klady na naru\u0161enie bezpe\u010dnosti zvy\u0161uj\u00fa o 670 000 USD a doch\u00e1dza aj k ohrozeniu du\u0161evn\u00e9ho vlastn\u00edctva a osobn\u00fdch \u00fadajov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Svetl\u00e9 str\u00e1nky shadow IT?<\/h2>\n\n\n\n<p>Tie\u0148ov\u00e9 IT v\u0161ak nie je nie\u010do, \u010do by sa malo \u00faplne odp\u00edsa\u0165. Hoci je to ur\u010dite rizikov\u00fd faktor, m\u00e1 aj niektor\u00e9 v\u00fdhody, ako napr\u00edklad:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox\">\n<li><strong>Zv\u00fd\u0161enie produktivity<\/strong>: T\u00ed, ktor\u00ed h\u013eadaj\u00fa vy\u0161\u0161iu efekt\u00edvnos\u0165 a produktivitu, ju m\u00f4\u017eu n\u00e1js\u0165 v nepovolen\u00fdch produktoch, ktor\u00e9 pou\u017e\u00edvaj\u00fa.<\/li>\n\n\n\n<li><strong>Zv\u00fdraznenie technologick\u00fdch medzier<\/strong>: Mo\u017eno, \u017ee dostupn\u00e9 n\u00e1stroje naozaj nesta\u010dia a individu\u00e1lne vo\u013eby zamestnancov m\u00f4\u017eu informova\u0165 IT oddelenie spolo\u010dnosti o spr\u00e1vnych alternat\u00edvach.<\/li>\n\n\n\n<li><strong>N\u00e1klady<\/strong>: Bu\u010fme \u00faprimn\u00ed, v dne\u0161nej dobe je v\u0161etko drah\u00e9. Po\u010d\u00edta\u010de, telef\u00f3ny, SaaS&#8230; a n\u00e1klady st\u00e1le rast\u00fa. T\u00fdm, \u017ee sa spolo\u010dnosti nemusia zav\u00e4zova\u0165 k zv\u00fd\u0161en\u00fdm n\u00e1kupom, m\u00f4\u017eu v dlhodobom horizonte u\u0161etri\u0165 na n\u00e1kladoch.<\/li>\n\n\n\n<li><strong>Lep\u0161ie monitorovanie bezpe\u010dnosti<\/strong>: Zaveden\u00edm nov\u00fdch objektov do podnikov\u00e9ho prostredia m\u00f4\u017ee bezpe\u010dnostn\u00fd person\u00e1l lep\u0161ie pochopi\u0165, ako riadi\u0165 extern\u00e9 rizik\u00e1, a v tomto pr\u00edpade lep\u0161ie ur\u010di\u0165, \u010do je a \u010do nie je rizikov\u00e9 spr\u00e1vanie zamestnancov.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Hlavn\u00e9 \u00faskalia<\/h2>\n\n\n\n<p>Probl\u00e9mom tie\u0148ov\u00e9ho IT je, \u017ee je \u0165a\u017ek\u00e9 pos\u00fadi\u0165 jeho rozsah v r\u00e1mci organiz\u00e1cie.<\/p>\n\n\n\n<p>Vzh\u013eadom na obrovsk\u00fd po\u010det zariaden\u00ed a programov, ktor\u00e9 sa pravdepodobne pou\u017e\u00edvaj\u00fa, je takmer nemo\u017en\u00e9 ich kontrolova\u0165. Takmer. V pr\u00edpade softv\u00e9ru nain\u0161talovan\u00e9ho na pracovn\u00fdch po\u010d\u00edta\u010doch to m\u00f4\u017ee by\u0165 jednoduch\u0161ie, preto\u017ee s\u00fa u\u017e vybaven\u00e9 softv\u00e9rom na vzdialen\u00fa spr\u00e1vu alebo bezpe\u010dnostn\u00fdm softv\u00e9rom, ale v pr\u00edpade neautorizovan\u00fdch zariaden\u00ed je to pravdepodobne o nie\u010do zlo\u017eitej\u0161ie.<\/p>\n\n\n\n<p>Uvedomel\u00e9 spolo\u010dnosti rie\u0161ia tento probl\u00e9m prostredn\u00edctvom segment\u00e1cie siete (napr\u00edklad hos\u0165ovsk\u00e9 Wi-Fi) a spr\u00e1vy pr\u00edstupu (vy\u017eaduj\u00face chr\u00e1nen\u00fa VPN pre pr\u00edstup k intern\u00fdm serverom), ale to nezabr\u00e1ni \u013eu\u010fom kop\u00edrova\u0165 alebo posiela\u0165 s\u00fabory do neautorizovan\u00fdch priestorov, \u010do je \u010fal\u0161\u00ed multiplik\u00e1tor rizika. Preto je potrebn\u00e9 <a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\">uprednostni\u0165 prevenciu<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako sa chr\u00e1ni\u0165?<\/h2>\n\n\n\n<p>Na boj proti shadow IT a z\u00e1rove\u0148 na zv\u00fd\u0161enie produktivity zamestnancov by mali firmy:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox\">\n<li><strong>Presadzova\u0165 intern\u00e9 politiky<\/strong>: Jasnou komunik\u00e1ciou o\u010dak\u00e1van\u00ed zo strany IT, vr\u00e1tane potenci\u00e1lnych sankci\u00ed, m\u00f4\u017eu podniky zv\u00fd\u0161i\u0165 povedomie zamestnancov a z\u00e1rove\u0148 zn\u00ed\u017ei\u0165 svoju zodpovednos\u0165.<\/li>\n\n\n\n<li><strong>Zamera\u0165 sa na povedomie o bezpe\u010dnosti<\/strong>: <strong><a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/category\/skolenie-kybernetickej-bezpecnosti-pre-zamestnancov\/\">\u0160kolenia o kybernetickej bezpe\u010dnosti<\/a><\/strong> by mali vysvet\u013eova\u0165 rizik\u00e1 spojen\u00e9 s neoveren\u00fdmi zariadeniami alebo aplik\u00e1ciami a rie\u0161i\u0165 tie\u0148ov\u00e9 IT ako k\u013e\u00fa\u010dov\u00fd bod.<\/li>\n\n\n\n<li><strong>Zis\u0165ova\u0165 n\u00e1zory zamestnancov<\/strong>: Je pravdepodobn\u00e9, \u017ee zamestnanci maj\u00fa objekt\u00edvne d\u00f4vody na pou\u017e\u00edvanie tie\u0148ov\u00e9ho IT. Zistite n\u00e1zory zamestnancov, aby ste podrobne op\u00edsali ich sk\u00fasenosti a pos\u00fadili pr\u00edle\u017eitosti na dosiahnutie lep\u0161ej n\u00e1vratnosti invest\u00edci\u00ed s\u00favisiacej s pou\u017e\u00edvan\u00edm produktov.<\/li>\n\n\n\n<li><strong>Vylep\u0161ite monitorovanie<\/strong>: Nem\u00e1te nain\u0161talovan\u00e9ho akt\u00edvneho monitorovacieho agenta na zariaden\u00ed tie\u0148ov\u00e9ho IT? \u017diaden probl\u00e9m. Ak sa t\u00edto zamestnanci prip\u00e1jaj\u00fa k firemn\u00fdm sie\u0165am, jednoducho skontrolujte sie\u0165ov\u00fa aktivitu a prev\u00e1dzku, aby ste zistili podozriv\u00e9 spr\u00e1vanie. V pr\u00edpade potenci\u00e1lne ne\u017eiaducich aplik\u00e1ci\u00ed alebo slu\u017eieb m\u00f4\u017ee by\u0165 ve\u013ekou pomocou nain\u0161talovan\u00fd bezpe\u010dnostn\u00fd agent alebo monitorovac\u00ed n\u00e1stroj.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-89a8d16ad2c8918065e35984fd2d8c1d\"><strong>Odborn\u00e9 tipy a postrehy<\/strong><br><br>Zamestnanci u\u017e roky pou\u017e\u00edvaj\u00fa neschv\u00e1len\u00e9 n\u00e1stroje \u2013 zn\u00e1me ako shadow IT \u2013 na obch\u00e1dzanie byrokracie a pomal\u00fdch intern\u00fdch procesov, ktor\u00e9 spoma\u013euj\u00fa zav\u00e1dzanie nov\u00fdch technol\u00f3gi\u00ed. Pri h\u013eadan\u00ed nov\u00fdch rie\u0161en\u00ed na zv\u00fd\u0161enie produktivity tento pr\u00edstup \u010dasto prin\u00e1\u0161a do prostredia organiz\u00e1cie skryt\u00e9 rizik\u00e1, ktor\u00e9 pre\u0165a\u017een\u00e9 IT a bezpe\u010dnostn\u00e9 t\u00edmy nem\u00f4\u017eu pokry\u0165. \u010cast\u00e9 zav\u00e1dzanie nov\u00fdch, v\u00fdkonn\u00fdch a u\u017e\u00edvate\u013esky pr\u00edvetiv\u00fdch n\u00e1strojov umelej inteligencie tento trend e\u0161te viac posilnilo, v d\u00f4sledku \u010doho organiz\u00e1cie z\u00e1pasia s identifik\u00e1ciou a riaden\u00edm nezn\u00e1mych hrozieb zabudovan\u00fdch do ich produktov a infra\u0161trukt\u00fary. <br><br>A\u017e \u010das uk\u00e1\u017ee skuto\u010dn\u00fd vplyv tie\u0148ov\u00e9ho IT a tie\u0148ovej umelej inteligencie na procesy, produktivitu, ochranu \u00fadajov, bezpe\u010dnos\u0165 a kvalitu produktov. Osobitn\u00fa pozornos\u0165 si zasluhuj\u00fa softv\u00e9rov\u00e9 produkty, kde k\u00f3d generovan\u00fd umelou inteligenciou a postupy ako \u201evibe coding\u201c m\u00f4\u017eu (znova) zavies\u0165 nezabezpe\u010den\u00e9 n\u00e1vrhy a zranite\u013enosti zakorenen\u00e9 v zl\u00fdch programovac\u00edch n\u00e1vykoch pr\u00edtomn\u00fdch v tr\u00e9novac\u00edch d\u00e1tach umelej inteligencie. Hoci shadow IT m\u00f4\u017ee podporova\u0165 inov\u00e1cie, ak nie je riadne spravovan\u00e9, m\u00f4\u017ee sa sta\u0165 prek\u00e1\u017ekou, ktor\u00e1 m\u00f4\u017ee vies\u0165 k v\u00e1\u017enym incidentom alebo v najhor\u0161om pr\u00edpade ku katastrof\u00e1lnemu zlyhaniu organiz\u00e1cie.<br><br>Ondrej Kubovi\u010d, \u0161pecialista na digit\u00e1lnu bezpe\u010dnos\u0165 spolo\u010dnosti ESET<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co si zobra\u0165 z&nbsp;problematiky shadow IT?<\/h2>\n\n\n\n<p>Je tie\u0148ov\u00e9 IT probl\u00e9mom? Z\u00e1le\u017e\u00ed na uhle poh\u013eadu. Hoci ide o rizikov\u00fd faktor, ktor\u00fd zn\u00e1sobuje pravdepodobnos\u0165 \u00faniku \u00fadajov alebo kompromit\u00e1cie, m\u00e1 aj svoju pozit\u00edvnu str\u00e1nku. Pravdepodobne by nemalo zmysel zak\u00e1za\u0165 v\u0161etky tie\u0148ov\u00e9 aplik\u00e1cie, ale premeni\u0165 ich pou\u017e\u00edvanie na lep\u0161ie rozhodovanie o n\u00e1kupe zariaden\u00ed alebo softv\u00e9ru, ako aj na intern\u00e9 politiky t\u00fdkaj\u00face sa napr\u00edklad BYOD.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Pravdepodobne ste u\u017e po\u010duli o politik\u00e1ch BYOD (Bring Your Own Device), ktor\u00e9 umo\u017e\u0148uj\u00fa zamestnancom pou\u017e\u00edva\u0165 svoje osobn\u00e9 zariadenia na pracovn\u00e9 \u00fa\u010dely. Napriek tomu, \u017ee ide o \u201ecudzie\u201c m\u00e9di\u00e1 vo vn\u00fatornom syst\u00e9me, s\u00fa st\u00e1le pr\u00edsne spravovan\u00e9 a maj\u00fa k\u013e\u00fa\u010dov\u00fd v\u00fdznam pre zachovanie integrity vn\u00fatorn\u00fdch syst\u00e9mov firiem, ktor\u00e9 ich prev\u00e1dzkuj\u00fa. Zamestnanci vyu\u017e\u00edvaj\u00faci BYOD&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-6336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET<\/title>\n<meta name=\"description\" content=\"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET\" \/>\n<meta property=\"og:description\" content=\"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-12T14:10:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T14:12:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT?\",\"datePublished\":\"2025-09-12T14:10:39+00:00\",\"dateModified\":\"2025-09-12T14:12:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/\"},\"wordCount\":1747,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/09\\\/shadow-it-1.jpeg\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/\",\"name\":\"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/09\\\/shadow-it-1.jpeg\",\"datePublished\":\"2025-09-12T14:10:39+00:00\",\"dateModified\":\"2025-09-12T14:12:44+00:00\",\"description\":\"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/09\\\/shadow-it-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/09\\\/shadow-it-1.jpeg\",\"width\":1244,\"height\":700,\"caption\":\"BVF Shadow IT ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET","description":"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/","og_locale":"sk_SK","og_type":"article","og_title":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET","og_description":"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2025-09-12T14:10:39+00:00","article_modified_time":"2025-09-12T14:12:44+00:00","og_image":[{"width":1244,"height":700,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"8 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT?","datePublished":"2025-09-12T14:10:39+00:00","dateModified":"2025-09-12T14:12:44+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/"},"wordCount":1747,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/","name":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg","datePublished":"2025-09-12T14:10:39+00:00","dateModified":"2025-09-12T14:12:44+00:00","description":"Shadow IT ohrozuje bezpe\u010dnos\u0165 spolo\u010dnost\u00ed priamo pod nosom ich IT pracovn\u00edkov. Viete, \u010do v\u0161etko sa prip\u00e1ja do va\u0161ej firemnej siete?","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/09\/shadow-it-1.jpeg","width":1244,"height":700,"caption":"BVF Shadow IT ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ake-nastrahy-sa-skryvaju-v-tieni-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ak\u00e9 n\u00e1strahy sa skr\u00fdvaj\u00fa v\u00a0tieni shadow IT?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6336"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6336\/revisions"}],"predecessor-version":[{"id":6340,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6336\/revisions\/6340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6338"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}