{"id":6366,"date":"2025-10-10T15:34:41","date_gmt":"2025-10-10T13:34:41","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6366"},"modified":"2025-10-10T15:34:41","modified_gmt":"2025-10-10T13:34:41","slug":"vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/","title":{"rendered":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1024x576.png\" alt=\"BVF vyroba nahladovy obrazok\" class=\"wp-image-6367\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1024x576.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-300x169.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-768x432.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-370x208.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1170x658.png 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-972x546.png 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-760x428.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-270x152.png 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks.png 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><a><em>V\u00fdroba patr\u00ed medzi odvetvia, ktor\u00e9 \u010delia najv\u00e4\u010d\u0161iemu tlaku kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie bezpe\u010dnosti znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu. Siln\u00e1 kybernetick\u00e1 ochrana je preto nevyhnutnos\u0165ou.<\/em><\/a><\/p>\n\n\n\n<p>V\u00fdrobcovia \u010delia jedine\u010dnej kombin\u00e1cii riz\u00edk. Maj\u00fa extr\u00e9mne n\u00edzku toleranciu vo\u010di v\u00fdpadkom, nach\u00e1dzaj\u00fa sa v centre rozsiahlych a \u010dasto zlo\u017eit\u00fdch dod\u00e1vate\u013esk\u00fdch re\u0165azcov a ich konkuren\u010dn\u00e1 v\u00fdhoda je \u010dasto zalo\u017een\u00e1 na vysokohodnotnom du\u0161evnom vlastn\u00edctve, vr\u00e1tane propriet\u00e1rnych dizajnov a obchodn\u00fdch tajomstiev. T\u00e1to kombin\u00e1cia by mala by\u0165 varovn\u00fdm sign\u00e1lom pre ved\u00facich pracovn\u00edkov v oblasti IT a bezpe\u010dnosti, ktor\u00ed pracuj\u00fa v tomto sektore.<\/p>\n\n\n\n<p>Medzit\u00fdm sa povaha modern\u00fdch \u00fatokov stala \u010doraz komplexnej\u0161ou, sofistikovanej\u0161ou a ne\u00faprosnej\u0161ou. \u00dato\u010dn\u00edci \u010dasto kombinuj\u00fa technick\u00e9 exploity so soci\u00e1lnym in\u017einierstvom a kr\u00e1de\u017eou prihlasovac\u00edch \u00fadajov. Sna\u017eia sa zosta\u0165 dlhodobo neodhalen\u00ed a&nbsp;sk\u00f4r, ne\u017e za\u00fato\u010dia, zhroma\u017e\u010fuj\u00fa inform\u00e1cie a mapuj\u00fa syst\u00e9my.<\/p>\n\n\n\n<p>S\u00e9ria ransomv\u00e9rov\u00fdch \u00fatokov na vysokoprofilov\u00e9 ciele v posledn\u00fdch rokoch potvrdzuje riziko: digit\u00e1lni vydiera\u010di maj\u00fa tento sektor skuto\u010dne na mu\u0161ke. V oblasti, ktor\u00e1 sa spolieha na presnos\u0165, efekt\u00edvnos\u0165 a pr\u00edsne v\u00fdrobn\u00e9 pl\u00e1ny, m\u00f4\u017ee aj nieko\u013eko hod\u00edn v\u00fdpadku sp\u00f4sobi\u0165 vlnu v celom podniku a jeho sieti partnerov, \u010d\u00edm sa dopad \u00fatoku e\u0161te zv\u00e4\u010d\u0161\u00ed.<\/p>\n\n\n\n<p>To v\u0161ak neznamen\u00e1, \u017ee jedin\u00fdmi vecami, ktor\u00e9 stoja medzi va\u0161ou spolo\u010dnos\u0165ou a mega\u00fanikom, s\u00fa \u0161\u0165astie a \u010das. M\u00e1te mo\u017enos\u0165 zamyslie\u0165 sa nad rast\u00facim rizikom v tomto sektore \u2013 a nad t\u00fdm, ako ho mo\u017eno zn\u00ed\u017ei\u0165 na zvl\u00e1dnute\u013en\u00fa \u00farove\u0148 budovan\u00edm odolnosti a \u010do najskor\u0161\u00edm odha\u013eovan\u00edm hrozieb.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">V\u00fdroba v h\u013ead\u00e1\u010diku<\/h2>\n\n\n\n<p>Pod\u013ea <a href=\"https:\/\/www.ibm.com\/downloads\/documents\/us-en\/1227cc9e83cb97ae\">spolo\u010dnosti IBM<\/a> bol v\u00fdrobn\u00fd sektor v uplynulom roku najviac ohrozen\u00fd na celom svete. Predstavuje \u0161tvrtinu (26 %) incidentov, ku ktor\u00fdm boli v danom obdob\u00ed privolan\u00ed pracovn\u00edci spolo\u010dnosti reaguj\u00faci na incidenty, pri\u010dom v regi\u00f3ne \u00c1zie a Tichomoria (APAC) tento podiel st\u00fapol na 40 %. Star\u0161ie technol\u00f3gie, a najm\u00e4 prepojen\u00e9 prev\u00e1dzkov\u00e9 technol\u00f3gie (OT), ako s\u00fa priemyseln\u00e9 riadiace syst\u00e9my a robotika, roz\u0161\u00edrili plochu \u00fatoku mnoh\u00fdch v\u00fdrobcov. To poskytuje mno\u017estvo pr\u00edle\u017eitost\u00ed pre odhodlan\u00fdch protivn\u00edkov. Toto s\u00fa \u010fal\u0161ie k\u013e\u00fa\u010dov\u00e9 zistenia:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Naj\u010dastej\u0161\u00edmi vektormi po\u010diato\u010dn\u00e9ho pr\u00edstupu boli zneu\u017eitie verejne dostupn\u00fdch aplik\u00e1ci\u00ed, platn\u00fdch \u00fa\u010dtov a extern\u00fdch vzdialen\u00fdch slu\u017eieb, \u010do poukazuje na to, ako \u00fato\u010dn\u00edci zneu\u017e\u00edvaj\u00fa nespr\u00e1vne nakonfigurovan\u00e9 alebo inak nezabezpe\u010den\u00e9 pr\u00edstupov\u00e9 body.<\/li>\n\n\n\n<li>Naj\u010dastej\u0161ie pozorovan\u00fdmi \u00fakonmi \u00fato\u010dn\u00edkov boli pr\u00edstup k serverom (16 %) a\u00a0malv\u00e9r-ransomv\u00e9r (16 %), \u010do ilustruje, \u017ee hlavn\u00fdmi cie\u013emi \u00fato\u010dn\u00edkov bolo naru\u0161enie prev\u00e1dzky a finan\u010dn\u00e9 vydieranie.<\/li>\n\n\n\n<li>Vydieranie, kr\u00e1de\u017e \u00fadajov, kr\u00e1de\u017e prihlasovac\u00edch \u00fadajov a po\u0161kodenie reput\u00e1cie boli najv\u00e4\u010d\u0161\u00edmi dopadmi pre v\u00fdrobcov, ktor\u00ed boli obe\u0165ami \u00fatokov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.verizon.com\/business\/resources\/Tea\/reports\/2025-dbir-data-breach-investigations-report.pdf#page=79\">Spolo\u010dnos\u0165 Verizon<\/a> zas kon\u0161tatuje, \u017ee potvrden\u00e9 naru\u0161enia v tomto sektore v roku 2025 medziro\u010dne vzr\u00e1stli o 89 %, pri\u010dom mal\u00e9 a stredn\u00e9 firmy s menej ako 1 000 zamestnancami predstavovali viac ako 90 % organiz\u00e1ci\u00ed, ktor\u00e9 boli obe\u0165ami \u00fatokov. Anal\u00fdza tie\u017e odha\u013euje, \u017ee p\u00e4tina naru\u0161en\u00ed bola sp\u00f4soben\u00e1 mot\u00edvmi s\u00favisiacimi so \u0161pion\u00e1\u017eou, \u010do je n\u00e1rast z iba 3 % v predch\u00e1dzaj\u00facom roku. Citliv\u00e9 pl\u00e1ny, spr\u00e1vy a e-maily boli naj\u010dastej\u0161ie kradnut\u00fdm typom \u00fadajov, \u010do poukazuje na riziko pre du\u0161evn\u00e9 vlastn\u00edctvo, ktor\u00e9 presahuje r\u00e1mec oby\u010dajn\u00e9ho vydierania. Mohlo by to znamena\u0165 oper\u00e1cie \u00fato\u010dn\u00edkov napojen\u00fdch na vl\u00e1dy alebo konkurentov, ktor\u00ed maj\u00fa z\u00e1ujem ukradn\u00fa\u0165 obchodn\u00e9 tajomstv\u00e1.<\/p>\n\n\n\n<p>To znamen\u00e1, \u017ee pr\u00edtomnos\u0165 malv\u00e9ru v naru\u0161eniach bezpe\u010dnosti vo v\u00fdrobe sa v danom obdob\u00ed zv\u00fd\u0161ila z 50 % na 66 %, \u010do mo\u017eno prip\u00edsa\u0165 ransomv\u00e9ru a preferencii \u201evniknutia do syst\u00e9mu\u201c ako najbe\u017enej\u0161iemu typu hrozby. Ide o komplexn\u00e9 \u00fatoky, ktor\u00e9 na dosiahnutie svojich cie\u013eov vyu\u017e\u00edvaj\u00fa \u201emalv\u00e9r a\/alebo hacking\u201c. Mo\u017eno s istotou poveda\u0165, \u017ee v\u00fdrobcovia bud\u00fa na\u010falej pevne v h\u013ead\u00e1\u010diku sofistikovan\u00fdch protivn\u00edkov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">V\u00fdroba a varovn\u00e9 pr\u00edbehy<\/h2>\n\n\n\n<p>V\u00fdrobcovia nemusia d\u00e1va\u0165 pozor len na finan\u010dne motivovan\u00fdch kyberzlo\u010dincov. Ned\u00e1vna kampa\u0148, ktor\u00fa zaznamenala spolo\u010dnos\u0165 ESET, bola zameran\u00e1 na v\u00fdrobcov, ako aj na spolo\u010dnosti v in\u00fdch odvetviach. Bola prip\u00edsan\u00e1 skupine RomCom, ktor\u00e1 kombinuje kyberzlo\u010dineck\u00e9 kampane a \u0161pion\u00e1\u017ene aktivity. T\u00e1to kampa\u0148 vyu\u017eila <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/nebezpecna-chyba-vo-winrar-cielom-boli-aj-europske-firmy\/\">zranite\u013enos\u0165 typu zero-day v programe WinRAR<\/a> na tajn\u00e9 kr\u00e1de\u017ee citliv\u00fdch inform\u00e1ci\u00ed, \u010do poukazuje na sofistikovanos\u0165 niektor\u00fdch akt\u00e9rov hrozieb zameran\u00fdch na tento sektor.<\/p>\n\n\n\n<p>\u010eal\u0161ie varovanie prich\u00e1dza v podobe naru\u0161enia bezpe\u010dnosti v <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/clorox-sues-cognizant-2023\/\">spolo\u010dnosti Clorox<\/a> v roku 2023, ktor\u00e9 st\u00e1lo v\u00fdrobcu \u010distiacich prostriedkov desiatky mili\u00f3nov dol\u00e1rov. Incident, ktor\u00fd vyplynul z jedin\u00e9ho vishingov\u00e9ho \u00fatoku a s\u00faboru prihlasovac\u00edch \u00fadajov, ovplyvnil firmu na cel\u00e9 t\u00fd\u017edne a naru\u0161il jej prev\u00e1dzku a dod\u00e1vate\u013esk\u00fd re\u0165azec. Skuto\u010dnos\u0165, \u017ee sa to \u00fadajne stalo v d\u00f4sledku \u013eudsk\u00e9ho zlyhania zo strany IT outsourcera, poukazuje na viacvrstvov\u00fa povahu kybernetick\u00fdch riz\u00edk, ktor\u00fdm \u010delia v\u00fdrobcovia.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><a href=\"https:\/\/www.eset.com\/sk\/prevencia-na-prvom-mieste\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-1024x536.jpg\" alt=\"BVF prevencia na prvom mieste\" class=\"wp-image-6089\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628-760x398.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/11\/banner_EPP_1200x628.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Kde sa hod\u00ed MDR<\/h2>\n\n\n\n<p>Ot\u00e1zkou je, ako m\u00f4\u017eu v\u00fdrobcovia najlep\u0161ie vyu\u017ei\u0165 tieto varovn\u00e9 pr\u00edbehy, aby minimalizovali kybernetick\u00e9 riziko vo svojej organiz\u00e1cii. Prv\u00fdm krokom by malo by\u0165 budovanie odolnosti prostredn\u00edctvom osved\u010den\u00fdch postupov, ako je viacfaktorov\u00e1 autentiz\u00e1cia (MFA), r\u00fdchle opravy a \u0161ifrovanie \u00fadajov. To je k\u013e\u00fa\u010dom k blokovaniu po\u010diato\u010dn\u00e9ho pr\u00edstupu a zabr\u00e1neniu later\u00e1lnemu pohybu, kde je to mo\u017en\u00e9. Nie je to v\u0161ak z\u00e1zra\u010dn\u00fd liek.<\/p>\n\n\n\n<p>V\u00fdrobcovia by mali tie\u017e investova\u0165 do nepretr\u017eitej detekcie a reakcie vo svojich e-mailov\u00fdch, cloudov\u00fdch, serverov\u00fdch, sie\u0165ov\u00fdch a in\u00fdch prostrediach. Ak je va\u0161a spolo\u010dnos\u0165 ve\u013ek\u00fdm podnikom s dostato\u010dn\u00fdm rozpo\u010dtom, m\u00f4\u017ee to urobi\u0165 prostredn\u00edctvom intern\u00e9ho t\u00edmu bezpe\u010dnostn\u00fdch oper\u00e1ci\u00ed (SecOps), ktor\u00fd pracuje z bezpe\u010dnostn\u00e9ho opera\u010dn\u00e9ho centra (SOC) s n\u00e1strojmi XDR.<\/p>\n\n\n\n<p>Pre mnoh\u00fdch, najm\u00e4 pre 90 % napadnut\u00fdch v\u00fdrobcov s menej ako 1 000 zamestnancami, v\u0161ak m\u00f4\u017ee by\u0165 rozumnej\u0161ou vo\u013ebou outsourcing expertn\u00e9ho poskytovate\u013ea slu\u017eieb <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/managed-detection-and-response\/\">riadenej detekcie a reakcie (MDR)<\/a><\/strong>. Dobre zvolen\u00fd dod\u00e1vate\u013e MDR m\u00f4\u017ee poskytova\u0165 cel\u00fd rad funkci\u00ed r\u00fdchlej\u0161ie a n\u00e1kladovo efekt\u00edvnej\u0161ie ako ich budovanie interne, vr\u00e1tane:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitorovanie hrozieb 24 hod\u00edn denne, 7 dn\u00ed v t\u00fd\u017edni, 365 dn\u00ed v roku odborn\u00fdm t\u00edmom.<\/li>\n\n\n\n<li>Ni\u017e\u0161ie n\u00e1klady v porovnan\u00ed s vysok\u00fdmi kapit\u00e1lov\u00fdmi a prev\u00e1dzkov\u00fdmi n\u00e1kladmi potrebn\u00fdmi na person\u00e1lne obsadenie a \u00fadr\u017ebu SOC.<\/li>\n\n\n\n<li>Odborn\u00e9 vyh\u013ead\u00e1vanie hrozieb s cie\u013eom n\u00e1js\u0165 tie najsofistikovanej\u0161ie hrozby.<\/li>\n\n\n\n<li>R\u00fdchla detekcia, reakcia a obmedzenie hrozieb s cie\u013eom minimalizova\u0165 finan\u010dn\u00e9 riziko, riziko po\u0161kodenia reput\u00e1cie a riziko nedodr\u017eania predpisov.<\/li>\n\n\n\n<li>Zlep\u0161en\u00e1 finan\u010dn\u00e1 a prev\u00e1dzkov\u00e1 odolnos\u0165 t\u00fdm, \u017ee organiz\u00e1cia m\u00f4\u017ee pokra\u010dova\u0165 vo v\u00fdrobe aj po \u00fatoku.<\/li>\n\n\n\n<li>Z\u00edskan\u00e9 poznatky na budovanie odolnosti proti podobn\u00fdm \u00fatokom<\/li>\n<\/ul>\n\n\n\n<p>Vybudovanie vyspel\u00e9ho SOC s nepretr\u017eit\u00fdm pokryt\u00edm, vyh\u013ead\u00e1van\u00edm hrozieb a forenzn\u00fdmi zru\u010dnos\u0165ami zvy\u010dajne trv\u00e1 roky a vy\u017eaduje zna\u010dn\u00e9 invest\u00edcie, zatia\u013e \u010do poskytovatelia MDR r\u00fdchlo prin\u00e1\u0161aj\u00fa zaveden\u00fd bal\u00edk a sk\u00fasen\u00fd t\u00edm. N\u00e1klady na invest\u00edcie a prev\u00e1dzku intern\u00e9ho SOC a \u0161pecializovan\u00e9 bezpe\u010dnostn\u00e9 znalosti potrebn\u00e9 na monitorovanie komplexn\u00fdch prostred\u00ed s\u00fa \u010dasto ne\u00fanosn\u00e9, najm\u00e4 pre mal\u00e9 a stredn\u00e9 firmy. Okrem toho, postupy t\u00edmov MDR klad\u00fa d\u00f4raz na obmedzenie \u00fatoku a r\u00fdchlu obnovu s cie\u013eom minimalizova\u0165 prestoje vo v\u00fdrobe, \u010do je kritick\u00fd ukazovate\u013e pre v\u00fdrobn\u00fd priemysel. Pre mnoh\u00fdch v\u00fdrobcov <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/managed-detection-and-response\/\">poskytuje MDR najr\u00fdchlej\u0161iu a naj\u00faspornej\u0161iu cestu k prev\u00e1dzkovej odolnosti<\/a><\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ka\u017ed\u00e1 sekunda sa po\u010d\u00edta<\/h2>\n\n\n\n<p>\u010ci u\u017e maj\u00fa za cie\u013e va\u0161u IP adresu, \u00fadaje o z\u00e1kazn\u00edkoch alebo jednoducho sp\u00f4sobi\u0165 \u010do najv\u00e4\u010d\u0161ie naru\u0161enie s cie\u013eom vydierania, ke\u010f \u00fato\u010dn\u00edci za\u00fato\u010dia, za\u010d\u00edna sa z\u00e1vod o ich n\u00e1jdenie a zastavenie. MDR m\u00f4\u017ee tento proces ur\u00fdchli\u0165 a poskytn\u00fa\u0165 v\u010dasn\u00e9 varovanie, ktor\u00e9 potrebujete na spustenie pl\u00e1nov reakcie na incidenty.<\/p>\n\n\n\n<p>Neust\u00e1ly preh\u013ead o koncov\u00fdch bodoch a sie\u0165ov\u00fdch a cloudov\u00fdch prostrediach sa tie\u017e dokonale zhoduje s osved\u010den\u00fdm pr\u00edstupom Zero Trust. Kombin\u00e1ciou najlep\u0161\u00edch \u013eudsk\u00fdch znalost\u00ed a pokro\u010dil\u00fdch technol\u00f3gi\u00ed je MDR nielen zauj\u00edmavou vo\u013ebou pre va\u0161u firmu. M\u00f4\u017ee by\u0165 aj k\u013e\u00fa\u010dom k zabezpe\u010deniu v\u00e1\u0161ho roz\u0161\u00edren\u00e9ho dod\u00e1vate\u013esk\u00e9ho re\u0165azca.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/managed-detection-and-response\/\">Viac o ESET MDR<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>V\u00fdroba patr\u00ed medzi odvetvia, ktor\u00e9 \u010delia najv\u00e4\u010d\u0161iemu tlaku kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie bezpe\u010dnosti znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu. Siln\u00e1 kybernetick\u00e1 ochrana je preto nevyhnutnos\u0165ou. V\u00fdrobcovia \u010delia jedine\u010dnej kombin\u00e1cii riz\u00edk. Maj\u00fa extr\u00e9mne n\u00edzku toleranciu vo\u010di v\u00fdpadkom, nach\u00e1dzaj\u00fa sa v centre rozsiahlych a \u010dasto zlo\u017eit\u00fdch dod\u00e1vate\u013esk\u00fdch re\u0165azcov a ich konkuren\u010dn\u00e1 v\u00fdhoda je \u010dasto zalo\u017een\u00e1 na vysokohodnotnom du\u0161evnom vlastn\u00edctve, vr\u00e1tane propriet\u00e1rnych dizajnov a&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6368,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-6366","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET<\/title>\n<meta name=\"description\" content=\"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET\" \/>\n<meta property=\"og:description\" content=\"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-10T13:34:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku?\",\"datePublished\":\"2025-10-10T13:34:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/\"},\"wordCount\":1541,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/manufacturing-cyber-risks-1.png\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/\",\"name\":\"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/manufacturing-cyber-risks-1.png\",\"datePublished\":\"2025-10-10T13:34:41+00:00\",\"description\":\"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/manufacturing-cyber-risks-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/10\\\/manufacturing-cyber-risks-1.png\",\"width\":1244,\"height\":700,\"caption\":\"BVF vyroba ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET","description":"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/","og_locale":"sk_SK","og_type":"article","og_title":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET","og_description":"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2025-10-10T13:34:41+00:00","og_image":[{"width":1244,"height":700,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku?","datePublished":"2025-10-10T13:34:41+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/"},"wordCount":1541,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/","name":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png","datePublished":"2025-10-10T13:34:41+00:00","description":"V\u00fdroba patr\u00ed medzi odvetvia s najv\u00e4\u010d\u0161\u00edm tlakom kybernetick\u00fdch hrozieb. Ka\u017ed\u00e9 naru\u0161enie znamen\u00e1 riziko pre v\u00fdrobn\u00fd proces aj reput\u00e1ciu.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2025\/10\/manufacturing-cyber-risks-1.png","width":1244,"height":700,"caption":"BVF vyroba ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/vyroba-pod-palbou-ako-predist-nicivemu-kyberutoku\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"V\u00fdroba pod pa\u013ebou: Ako pred\u00eds\u0165 ni\u010div\u00e9mu kyber\u00fatoku?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6366"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6366\/revisions"}],"predecessor-version":[{"id":6369,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6366\/revisions\/6369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6368"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}