Posted: by Jan Nawrot




Choose wisely - Scanner Lemlock
Marcin Bardowski

07-06-2021 | cyber security

Network security is an absolute “must have” in practically any enterprise. After all, proper network security means appropriate protection of sensitive data, which is just as important from the point of view of the company (e.g. financial data) as of the employees and contractors (personal data). Due to this fact, it is absolutely necessary to take appropriate steps in order to secure high level of the security of the company's network and applications used.

What strategies enhance the security of IT systems, also those which are under development?
Marcin Michalski

19-03-2021 | monitoring, penetration test, scanner, security audit

Cyber attacks have become commonplace. What only a few years ago seemed to us like a fiction from an action movie, today no one is surprised anymore. Every day we hear about another attack, data leak or even a complete paralysis of the enterprise. We see that the target of attacks are both giants such as Maersk or British Airway and small companies and government entities such as Lututów Municipality Office, Warsaw University of Technology or Polish Financial Supervision Authority.


Practical ways to protect personal data in web applications in accordance with the GDPR

Each creator of a web product or application on which personal data is processed is obliged to secure them by implementing the GDPR. Therefore, the application should contain several functionalities that increase the protection of data provided by users. How can a product designer ensure information security in accordance with the applicable GDPR rules?

Vulnerabilities in the ZOOM application
Bartłomiej Balcerek

24-09-2020 | application, application zoom, security

Let's talk about the ZOOM application for a moment ... The platform, which has recently become very popular, has attracted the interest of not only users but also hackers. In a new article on our blog, we write about the vulnerabilities of the ZOOM application. What do you think about it?

5 techniques that will help you check web application security
Weronika Masternak

24-02-2020 | cybersecurity

Stop once and for all with theoretical talk about security of company or IT system. Turn it all into real action! Unauthorized violation of the web application and data breach cause many problems, however, all this can be easily avoided. Check out 5 ways to protect your application against hacker attacks.


Lemlock Recognized as Top IT & Business in Germany by Clutch
Weronika Masternak

21-10-2019 | cybersecurity, gdpr

October is the month of many new challenges in the field of cyber security and interesting implementation for clients. Unexpectedly something else happened - we were honored by and our brand Lemlock was included in the list of the TOP IT & Business Service Providers in Germany. See why Lemlock deserved this award.

How to ensure security in a company and how hacker attacks affect business?
Weronika Masternak

13-09-2019 | cybersecurity, development, gdpr

When running an organization that is based on the use of IT systems or other applications, you should always consider cybersecurity and personal data protection issues. One negligence can have a number of negative effects and even lead to the collapse of the company. Find out if your business can be targeted by hackers and how to ensure the cyber security of your company and its resources.


Five principles of successful cooperation between CMO and CIO
Jan Nawrot

11-01-2018 | cybersecurity, marketing

The majority of organizations consist of various groups of employees, starting with people dealing with reception duties, finance, administration, quality management systems, production, and ending with customer service or accounting. Each department has directors who primarily focus on the proper performance of duties by the mentees, as well as sustainable development. This results in the fact that the managers compete with each other in terms of achieved results, despite dealing with different areas in the organization. Increasingly, the competition between CMOs and CIOs is a hot topic. Is this rivalry advisable when the importance of both CMO and CIO increases at the same rate? How to achieve synergy in the cooperation of these two departments?

Impact GDPR on e-commerce
Jan Nawrot

05-01-2018 | cybersecurity, gdpr, marketing

The e-commerce industry is particularly sensitive to changes in regulatory regulations due to the specificity of its marketing strategies. General Data Protection Regulation (GDPR) will make e-business once again measure their compliance with legislation.


How was GDPR introduced? Facts.
Jan Nawrot

25-10-2017 | gdpr

What does the mysterious acronym of GDPR stand for?

As an entrepreneur you are definitely aware of the personal data that exist in company space. These are information about employees working for the organization (e.g. payrolls, complete personal data, photocopies of identity documents, ID or PESEL), as well as information about its clients (e.g. performed services, performed transactions and terms of cooperation). These data and their proper generation, processing and use are of great importance, but is it sufficient? This question is worth considering, as new European Data Protection Regulations come into force on May 25, 2018!

Step-by-step preparation for GDPR - checklist
Jan Nawrot

16-10-2017 | gdpr

"Does GDPR affect me?" is a common question among entrepreneurs.

Recently, there has been a lot of buzz around the new pan-European data protection regulations - the General Data Protection Regulation (GDPR). Why? As it turns out, entrepreneurs are unaware that this Regulation will enter into force on May 25, 2018, and that they must plan and then make changes to the management of personal data. According to a survey conducted by the DMA in 2016, for the question of how much the surveyed companies are prepared for inevitable changes, 46% of them expressed complete readiness, 24% said they were partially ready, while 30% thought they were completely unprepared.

Data protected under GDPR is not everything. Which information in the organization should be particularly secured?
Jan Nawrot

13-10-2017 | gdpr

We already know that the May 2018 Regulation sets a new dimension in the protection of personal data and makes changes to the definition of sensitive data. This information plays a key role for companies processing them in space. Are there any additional confidential materials that could compromise the proper functioning of the organization and which are not covered by the General Data Protection Regulation - GDPR? Yes, and more importantly, when they are neglected they can cause the same (often irreversible) damage, loss of competitive advantage or loss of market position.

Inconsistent data management by small, medium and large players in the market
Jan Nawrot

9-10-2017 | gdpr

People do not realize how valuable their personal data is. Only when data is used by unauthorized persons/organizations do people realize that it was worth taking care of proper security. What if, despite the high level of protection, personal data is illegally acquired and used? There are many questions about how this can happen, who is responsible for it, and what the negative consequences of the situation will be.

Data protection and actions at the time of the incident - a short introduction to the valid remedial procedures
Jan Nawrot

6-10-2017 | gdpr

Acquisition, management, rewriting and storage of data should be based on decisions that take into account possible risks. This risk may be due to poor processing conditions, improper removal, loss, theft, uncontrolled modification, unauthorized access, or improper storage. It is important to identify possible scenarios for data loss - to determine the probability and frequency of their occurrence, the degree of harm and, in the next step, to plan actions to bring the crisis to a standstill. It should be noted that the May Regulation is not a set of ready-to-use solutions. It does not provide clear-cut methods for dealing with the problems that may arise in the protection of personal data, but allows the requirements of the Regulation to be adapted to the scale and validity of the data.

What data should be protected? Are there any types of data whose processing is prohibited?
Jan Nawrot

5-10-2017 | gdpr

Due to Data Protection Regulation, many companies may ask themselves whether their databases are also subject to regulation. It is particularly unclear when the company does not have information that directly identifies a particular natural person, such as a name and surname, but has a substitute, e. g. a pseudonym or only the IP address from which the network connection is made. Is it necessary to secure the data also in this case? What types of data should be protected according to GDPR?

An overview of the Regulation and its most frequently discussed issues
Jan Nawrot

28-09-2017 | gdpr

The General Data Protection Regulation (GDPR, RODO) was established by the Regulation of the European Parliament and of the Council of April 27, 2016. This EU legislation contains provisions on the protection of individuals with regard to the processing of personal data and the free movement of such information. The purpose of the Regulation is to harmonize the process of personal data transfer across the EU. After a two-year transitional period, the Regulation will become effective in the Member States from May 25, 2018. The new regulations will be applied directly without the need for their implementation.

Are you interested in a comprehensive solution
for your data security?
Consent to  data processing for contact purposes
I confirm that I have read the  information clause of Sagiton Sp. z o.o.

I hereby give consent to the processing of my personal data by the Personal Data Controller (hereinafter: "PDC") – Sagiton Sp. z o.o. ul. Fabryczna 19, 53-609 Wrocław, within the scope of: full name, e-mail address or telephone number, for the purpose of sale of products and services of Sagiton Sp. z o.o. and for the purpose of sending me feedback and making contact with me by Sagiton Sp. z o.o.

At the same time, I acknowledge that: at any time I can request the removal of my personal data from the PDC Sagiton Sp. z o.o. database, by sending an e-mail to [email protected], or a letter to Sagiton Sp. z o.o., ul. Fabryczna 19, 53-609 Wrocław, with a statement containing the relevant request, which shall result in the deletion of my personal data from the PDC Sagiton Sp. z o.o. database; I have the right to access my data; providing my data is voluntary, however refusal to provide it is tantamount to not receiving information regarding sale of products and services of Sagiton Sp. z o.o., as well as not receiving feedback and making contact with me by Sagiton Sp. z o.o.

In accordance with Art. 13 section 1 of the General Data Protection Regulation of 27 April 2016, (GDPR), we would like to inform you that the controller of your personal data is Sagiton Sp. z o.o. with its registered office at ul. Fabryczna 19, 53-609 Wrocław, e-mail: [email protected].

Your personal data shall be processed within the scope of: full name, e-mail address and/or telephone number in order to answer your question/request for contact and send feedback – pursuant to Art. 6 section 1 (a) of the GDPR, i.e. consent to the processing of personal data.

The data controller would like to inform you that your personal data shall not be disclosed to third parties.

Your data shall not be transferred outside of the European Economic Area or to international organizations.

Your personal data shall be processed until you withdraw your consent to the processing of data, as well as if the purpose for processing this data shall no longer be applicable.

You have the right to access your personal data, rectify it, delete it, restrict its processing, the right to transfer it, as well as the right to object.

In the case of giving your consent, you have the right to withdraw it at any time. Exercising the right to withdraw the consent does not affect the processing carried out before the consent was withdrawn.

You have the right to lodge a complaint with the supervisory body, i.e. the President of the Office for Personal Data Protection, ul. Stawki 2, 00-193 Warsaw.

Providing your personal data is a prerequisite for making contact with you by Sagiton Sp. z o.o. with its registered office at ul. Fabryczna 19, 53-609 Wrocław. In the case of not providing your personal data, Sagiton Sp. z o.o., shall not be able to contact you.

The Data Controller, Sagiton Sp. z o.o., would like to inform you that they shall not use your personal data for automated decision-making, which is based solely on automated processing, including profiling, and has legal effects for you or affects you significantly in a similar way.

Let's stay in contact