{"id":44,"date":"2025-04-24T13:32:15","date_gmt":"2025-04-24T13:32:15","guid":{"rendered":"https:\/\/cyberbezpiecznewodociagi.pl\/?page_id=44"},"modified":"2025-09-24T10:37:14","modified_gmt":"2025-09-24T10:37:14","slug":"wodociagi","status":"publish","type":"page","link":"https:\/\/cyberbezpiecznewodociagi.pl\/","title":{"rendered":"Wodoci\u0105gi"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"44\" class=\"elementor elementor-44\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ca9634 e-flex e-con-boxed e-con e-parent\" data-id=\"5ca9634\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd9449 elementor-widget elementor-widget-heading\" data-id=\"3cd9449\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><b>Chro\u0144 wodoci\u0105gi!  <\/b><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d47f09e e-con-full e-flex e-con e-child\" data-id=\"d47f09e\" data-element_type=\"container\" id=\"kontakt\">\n\t\t<div class=\"elementor-element elementor-element-4c04814 e-con-full e-flex e-con e-child\" data-id=\"4c04814\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4c386 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2d4c386\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW5563055 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW5563055 BCX0\">Zadbaj o bezpiecze\u0144stwo cyfrowe Twojej infrastruktury wodoci\u0105gowo-kanalizacyjnej z pomoc\u0105 ekspert\u00f3w z <\/span><\/span><span class=\"TextRun SCXW5563055 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW5563055 BCX0\"><strong><span style=\"color: #55ab26;\">AT Computers<\/span><\/strong>.<\/span><\/span><span class=\"EOP SCXW5563055 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><p>Zostaw swoje dane, a my<strong>\u00a0skontaktujemy si\u0119 z\u00a0Tob\u0105!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be35445 elementor-mobile-align-center elementor-hidden-desktop elementor-hidden-tablet elementor-invisible elementor-widget elementor-widget-button\" data-id=\"be35445\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#formularzm\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">WYPE\u0141NIJ FORMULARZ<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8d4ccf e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex elementor-invisible e-con e-child\" data-id=\"a8d4ccf\" data-element_type=\"container\" id=\"formularz\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a30c868 elementor-widget elementor-widget-spacer\" data-id=\"a30c868\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd08a22 elementor-widget elementor-widget-heading\" data-id=\"fd08a22\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wype\u0142nij formularz<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3857f8 elementor-widget__width-inherit elementor-widget elementor-widget-shortcode\" data-id=\"d3857f8\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f257-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"257\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F44#wpcf7-f257-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"257\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f257-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"imie\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Imi\u0119 i nazwisko\" value=\"\" type=\"text\" name=\"imie\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"jednostka\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nazwa jednostki\" value=\"\" type=\"text\" name=\"jednostka\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"telefon\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Numer telefonu\" value=\"\" type=\"tel\" name=\"telefon\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Adres e-mail\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<p class=\"privacy-info\"><br \/>\nDane osobowe podane w formularzu b\u0119d\u0105 przetwarzane w celu realizacji Twojego wniosku, zgodnie z jego zakresem, wed\u0142ug zasad zawartych w dokumencie pod nazw\u0105 <a href=\"https:\/\/atcomp.pl\/polityka-prywatnosci\/\" target=\"_blank\">Polityka Prywatno\u015bci<\/a>.\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"polityka\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"polityka[]\" value=\"*O\u015bwiadczam, \u017ce zapozna\u0142am\/-\u0142em si\u0119 z Polityk\u0105 Prywatno\u015bci.\" \/><span class=\"wpcf7-list-item-label\">*O\u015bwiadczam, \u017ce zapozna\u0142am\/-\u0142em si\u0119 z Polityk\u0105 Prywatno\u015bci.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"zgoda1\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"zgoda1[]\" value=\"*Wyra\u017cam zgod\u0119 na przetwarzanie moich danych osobowych w celu kontaktu ze mn\u0105 przedstawiciela AT Computers w zwi\u0105zku z interesuj\u0105cymi mnie produktami lub us\u0142ugami.\" \/><span class=\"wpcf7-list-item-label\">*Wyra\u017cam zgod\u0119 na przetwarzanie moich danych osobowych w celu kontaktu ze mn\u0105 przedstawiciela AT Computers w zwi\u0105zku z interesuj\u0105cymi mnie produktami lub us\u0142ugami.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"zgoda2\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"zgoda2[]\" value=\"Wyra\u017cam zgod\u0119 na przesy\u0142anie informacji handlowych za pomoc\u0105 \u015brodk\u00f3w komunikacji elektronicznej w rozumieniu ustawy z dnia 18 lipca 2002 roku o \u015bwiadczenie us\u0142ug drog\u0105 elektroniczn\u0105 (Dz.U.2017.1219 t.j.) na podany adres e-mail na temat us\u0142ug oferowanych przez AT Computers. Zgoda jest dobrowolna i mo\u017ce by\u0107 w ka\u017cdej chwili wycofana, klikaj\u0105c w odpowiedni link na ko\u0144cu wiadomo\u015bci e-mail. Wycofanie zgody nie wp\u0142ywa na zgodno\u015b\u0107 z prawem przetwarzania, kt\u00f3rego dokonano na podstawie zgody przez jej wycofaniem.\" \/><span class=\"wpcf7-list-item-label\">Wyra\u017cam zgod\u0119 na przesy\u0142anie informacji handlowych za pomoc\u0105 \u015brodk\u00f3w komunikacji elektronicznej w rozumieniu ustawy z dnia 18 lipca 2002 roku o \u015bwiadczenie us\u0142ug drog\u0105 elektroniczn\u0105 (Dz.U.2017.1219 t.j.) na podany adres e-mail na temat us\u0142ug oferowanych przez AT Computers. Zgoda jest dobrowolna i mo\u017ce by\u0107 w ka\u017cdej chwili wycofana, klikaj\u0105c w odpowiedni link na ko\u0144cu wiadomo\u015bci e-mail. Wycofanie zgody nie wp\u0142ywa na zgodno\u015b\u0107 z prawem przetwarzania, kt\u00f3rego dokonano na podstawie zgody przez jej wycofaniem.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"WY\u015aLIJ\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee6e582 elementor-widget elementor-widget-spacer\" data-id=\"ee6e582\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0f3b80 e-con-full e-flex e-con e-parent\" data-id=\"e0f3b80\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bef9bba elementor-widget elementor-widget-image\" data-id=\"bef9bba\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.gov.pl\/web\/cppc\/cyberbezpieczne-wodociagi\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1460\" height=\"616\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png\" class=\"attachment-full size-full wp-image-329\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png 1460w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2-300x127.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2-1024x432.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2-768x324.png 768w\" sizes=\"(max-width: 1460px) 100vw, 1460px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6966ddf e-flex e-con-boxed e-con e-parent\" data-id=\"6966ddf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67930c7 elementor-widget elementor-widget-spacer\" data-id=\"67930c7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6ef0b6 e-flex e-con-boxed e-con e-parent\" data-id=\"e6ef0b6\" data-element_type=\"container\" id=\"o-programie\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c9645f6 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"c9645f6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc85913 elementor-widget elementor-widget-image\" data-id=\"fc85913\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-1024x1024.jpg\" class=\"attachment-large size-large wp-image-381\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-1024x1024.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-300x300.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-150x150.jpg 150w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-768x768.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-1536x1536.jpg 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/rurociagi-stalowe-i-kable-w-zakladzie-1-2048x2048.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-141bfc1 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"141bfc1\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a469a93 elementor-widget elementor-widget-text-editor\" data-id=\"a469a93\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b><span data-contrast=\"auto\">Nowy konkurs grantowy KPO <\/span><\/b><b><span data-contrast=\"auto\">\u2014 &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Ministerstwo Cyfryzacji og\u0142osi\u0142o uruchomienie programu grantowego <\/span><b><span data-contrast=\"auto\">&#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;<\/span><\/b><span data-contrast=\"auto\">, kt\u00f3rego celem jest wsparcie przedsi\u0119biorstw wodoci\u0105gowo-kanalizacyjnych w dostosowaniu si\u0119 do wymaga\u0144 dyrektywy <\/span><b><span data-contrast=\"auto\">NIS2<\/span><\/b><span data-contrast=\"auto\"> oraz podniesienie poziomu ochrony system\u00f3w technologii operacyjnych (OT).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Granty finansowane s\u0105 w ramach <\/span><b><span data-contrast=\"auto\">Krajowego Planu Odbudowy i Zwi\u0119kszania Odporno\u015bci (KPO)<\/span><\/b><span data-contrast=\"auto\">. \u015arodki dost\u0119pne w konkursie wynosz\u0105 oko\u0142o <\/span><b><span data-contrast=\"auto\">300 mln z\u0142.<\/span><\/b><\/p><div id=\"message-list_1750759777.142949\" class=\"c-virtual_list__item\" tabindex=\"0\" role=\"listitem\" aria-setsize=\"-1\" data-qa=\"virtual-list-item\" data-item-key=\"1750759777.142949\"><div class=\"c-message_kit__background p-message_pane_message__message c-message_kit__message\" role=\"presentation\" data-qa=\"message_container\" data-qa-unprocessed=\"false\" data-qa-placeholder=\"false\"><div class=\"c-message_kit__hover\" role=\"document\" aria-roledescription=\"message\" data-qa-hover=\"true\"><div class=\"c-message_kit__actions c-message_kit__actions--above\"><div class=\"c-message_kit__gutter\"><div class=\"c-message_kit__gutter__right\" role=\"presentation\" data-qa=\"message_content\"><div class=\"c-message_kit__blocks c-message_kit__blocks--rich_text\"><div class=\"c-message__message_blocks c-message__message_blocks--rich_text\" data-qa=\"message-text\"><div class=\"p-block_kit_renderer\" data-qa=\"block-kit-renderer\"><div class=\"p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first\"><div class=\"p-rich_text_block\" dir=\"auto\"><div class=\"p-rich_text_section\"><b>Zakres projektu obejmuje dzia\u0142ania z obszar\u00f3w organizacji (procesy), technologii oraz kompetencji:<\/b><br \/>a) wdro\u017cenie \u015brodk\u00f3w organizacyjnych s\u0142u\u017c\u0105cych zapewnieniu cyberbezpiecze\u0144stwa,<br \/>b) zakup lub modernizacj\u0119 \u015brodk\u00f3w technicznych s\u0142u\u017c\u0105cych zapewnieniu cyberbezpiecze\u0144stwa,<br \/>c) rozw\u00f3j kompetencji personelu w zakresie cyberbezpiecze\u0144stwa<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"message-list_bottomSpacer\" class=\"c-virtual_list__item\" tabindex=\"-1\" role=\"presentation\" aria-setsize=\"-1\" data-qa=\"virtual-list-item\" data-item-key=\"bottomSpacer\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66f33a7 elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"66f33a7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2851f37 elementor-widget elementor-widget-spacer\" data-id=\"2851f37\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fac3df7 e-flex e-con-boxed e-con e-parent\" data-id=\"fac3df7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d93b087 e-con-full e-flex e-con e-child\" data-id=\"d93b087\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd487f3 elementor-widget elementor-widget-image\" data-id=\"bd487f3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-1024x683.jpg\" class=\"attachment-large size-large wp-image-198\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-1024x683.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-768x512.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-1536x1024.jpg 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/organizowanie-dokumentow-przez-mlodych-doroslych-2048x1365.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa4e09f elementor-hidden-tablet elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"aa4e09f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9babc5f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9babc5f\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c846cf6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c846cf6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Terminy i nab\u00f3r wniosk\u00f3w<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5910d0 elementor-widget elementor-widget-text-editor\" data-id=\"a5910d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ruszy\u0142 nab\u00f3r do og\u00f3lnopolskiego programu grantowego \u201eCyberbezpieczne Wodoci\u0105gi\u201d, kt\u00f3ry wspiera jednostki odpowiedzialne za infrastruktur\u0119 wodno-kanalizacyjn\u0105 w zakresie ochrony system\u00f3w IT i OT.<br \/><strong>Wnioski mo\u017cna sk\u0142ada\u0107 do 2 pa\u017adziernika 2025 r.<\/strong><br \/>Okres kwalifikowalno\u015bci wydatk\u00f3w trwa do 30 czerwca 2026 r.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5cc1ce elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"e5cc1ce\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-943d006 elementor-widget elementor-widget-spacer\" data-id=\"943d006\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8433739 e-flex e-con-boxed e-con e-parent\" data-id=\"8433739\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f96053 e-con-full e-flex e-con e-child\" data-id=\"7f96053\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-713168c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"713168c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/atcomp.pl\/baza-wiedzy\/ankiety\/ankieta-cyberbezpieczne-wodociagi\/\">Wype\u0142nij ankiet\u0119 <\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fc7b99 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"9fc7b99\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select.png\" class=\"attachment-large size-large wp-image-488\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select.png 512w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select-300x300.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e3d60f elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"6e3d60f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc1fb6 elementor-widget elementor-widget-spacer\" data-id=\"4cc1fb6\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abc57b4 e-flex e-con-boxed e-con e-parent\" data-id=\"abc57b4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8da1163 e-con-full e-flex e-con e-child\" data-id=\"8da1163\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6d5ecf elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f6d5ecf\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-1024x684.jpg\" class=\"attachment-large size-large wp-image-168\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-1024x684.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-768x513.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-1536x1025.jpg 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/ksiegowy-obliczajacy-zysk-z-wykresami-analizy-finansowej-2048x1367.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b41a042 e-con-full e-flex e-con e-child\" data-id=\"b41a042\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11533c9 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"11533c9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Koszty kwalifikowalne<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82f7047 elementor-widget elementor-widget-text-editor\" data-id=\"82f7047\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u015arodki mo\u017cna przeznaczy\u0107 na dzia\u0142ania w trzech g\u0142\u00f3wnych obszarach:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7ed6a5 elementor-widget elementor-widget-text-editor\" data-id=\"d7ed6a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>1. Organizacyjnym<br \/><strong><br \/>2. Technicznym:<\/strong><\/p><ul><li>Zakup i modernizacja system\u00f3w teleinformatycznych (sprz\u0119t, oprogramowanie).<\/li><li>Wdro\u017cenie system\u00f3w detekcji i reakcji na incydenty (np. SOC).<\/li><li>Us\u0142ugi zarz\u0105dzania podatno\u015bciami i skanery podatno\u015bci.<\/li><\/ul><p>3. Kompetencyjnym<\/p><p>Wydatki s\u0105 kwalifikowalne tylko w okresie trwania projektu, tj. od 1 czerwca 2023 roku do 30 czerwca 2026 roku. Koszty poniesione poza tym okresem nie b\u0119d\u0105 uznawane za kwalifikowalne. Maksymalna kwota dofinansowania dla pojedynczego wniosku wynosi <strong><span style=\"color: #55ab26;\">200 tys. euro.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ff8726 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"2ff8726\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f97dd6b elementor-widget elementor-widget-spacer\" data-id=\"f97dd6b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c80836 e-flex e-con-boxed e-con e-parent\" data-id=\"7c80836\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-641a7d8 e-con-full e-flex e-con e-child\" data-id=\"641a7d8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e2bc6e elementor-invisible elementor-widget elementor-widget-image\" data-id=\"6e2bc6e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-1024x683.jpg\" class=\"attachment-large size-large wp-image-169\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-1024x683.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-768x513.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-1536x1025.jpg 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/standardowa-koncepcja-kontroli-jakosci-m-2048x1367.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-507acab e-con-full e-flex e-con e-child\" data-id=\"507acab\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf0dd3e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"cf0dd3e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wymagania formalne<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fe33c4 elementor-widget elementor-widget-text-editor\" data-id=\"1fe33c4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol>\n<li>Ka\u017cdy wnioskodawca mo\u017ce z\u0142o\u017cy\u0107 tylko jeden wniosek o dofinansowanie.<\/li>\n <li>Wniosek powinien by\u0107 podpisany przez upowa\u017cnion\u0105 osob\u0119 za pomoc\u0105 podpisu elektronicznego (np. podpis GOV).<\/li>\n \t<li>Wnioskodawcy powinni przeprowadzi\u0107 audyt lub <strong>diagnoz\u0119 stanu cyberbezpiecze\u0144stwa<\/strong> przed z\u0142o\u017ceniem wniosku.<\/li>\n \t<li>Wnioskodawcy musz\u0105 uwzgl\u0119dni\u0107 wcze\u015bniejsze otrzymane wsparcie de minimis w ci\u0105gu ostatnich trzech lat, aby nie przekroczy\u0107 limitu 300 tys. Euro.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a373e0 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"8a373e0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b339b3 elementor-widget elementor-widget-spacer\" data-id=\"8b339b3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdc6a3b e-flex e-con-boxed e-con e-parent\" data-id=\"cdc6a3b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c98bc64 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c98bc64\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">W naszej ofercie znajdziesz najlepsze, sprawdzone, \u015bwiatowe rozwi\u0105zania w zakresie cyberbezpiecze\u0144stwa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-306815a e-flex e-con-boxed e-con e-parent\" data-id=\"306815a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdc7379 elementor-widget elementor-widget-spacer\" data-id=\"cdc7379\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6528a0b e-flex e-con-boxed e-con e-parent\" data-id=\"6528a0b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8b96b2 elementor-widget elementor-widget-image\" data-id=\"a8b96b2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"100\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-1024x128.png\" class=\"attachment-large size-large wp-image-88\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-1024x128.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-300x38.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-768x96.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg.png 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7656b4f elementor-widget elementor-widget-image\" data-id=\"7656b4f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"314\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo.png\" class=\"attachment-large size-large wp-image-90\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo.png 794w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo-300x119.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo-768x304.png 768w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18e15b8 elementor-widget elementor-widget-image\" data-id=\"18e15b8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"97\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1024x124.webp\" class=\"attachment-large size-large wp-image-89\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1024x124.webp 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-300x36.webp 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-768x93.webp 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1536x186.webp 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-2048x248.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-432a5d4 e-flex e-con-boxed e-con e-parent\" data-id=\"432a5d4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5833998 elementor-widget elementor-widget-spacer\" data-id=\"5833998\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de2d2cc e-flex e-con-boxed e-con e-parent\" data-id=\"de2d2cc\" data-element_type=\"container\" id=\"produkty\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c6ea3f5 e-con-full e-flex e-con e-child\" data-id=\"c6ea3f5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-064be2b elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"064be2b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-1024x576.jpg\" class=\"attachment-large size-large wp-image-397\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-1024x576.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-300x169.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-768x432.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-1536x864.jpg 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/nadzor-w-rutynowej-inspekcji-serwera-2048x1152.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6efb60d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6efb60d\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81a3b0a elementor-widget elementor-widget-spacer\" data-id=\"81a3b0a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c7c45c elementor-widget elementor-widget-heading\" data-id=\"5c7c45c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Redundancja: <\/b>nadmiarowo\u015b\u0107 system\u00f3w<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ece5a elementor-widget elementor-widget-text-editor\" data-id=\"84ece5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Posiadanie duplikat\u00f3w danych, system\u00f3w lub infrastruktury to kluczowy aspekt w dziedzinie IT. Minimalizuje ryzyko ca\u0142kowitej utraty danych poprzez zapewnienie dost\u0119pno\u015bci po utracie jednego z nich. Tworzenie kopii zapasowych i replikacja danych na r\u00f3\u017cnych systemach lub serwerach pozwala na szybkie przywr\u00f3cenie dzia\u0142ania po awarii. Administrator powinien aktywnie monitorowa\u0107 i zarz\u0105dza\u0107 tymi procesami, aby zapewni\u0107 niezawodno\u015b\u0107 i ci\u0105g\u0142o\u015b\u0107 dost\u0119pu do kluczowych system\u00f3w. Zabezpieczenie danych jest kluczowe w ochronie przed potencjalnymi zagro\u017ceniami i awariami.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb90ab6 elementor-widget elementor-widget-heading\" data-id=\"fb90ab6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8866f29 elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"8866f29\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"100\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-1024x128.png\" class=\"attachment-large size-large wp-image-88\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-1024x128.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-300x38.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-768x96.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg.png 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d96f6d5 elementor-widget elementor-widget-spacer\" data-id=\"d96f6d5\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4aedf8 e-con-full e-flex e-con e-child\" data-id=\"b4aedf8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88cbfde elementor-widget elementor-widget-image\" data-id=\"88cbfde\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/21-1.jpg\" class=\"attachment-large size-large wp-image-144\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/21-1.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/21-1-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/21-1-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa43d58 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"fa43d58\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad62338 elementor-widget elementor-widget-spacer\" data-id=\"ad62338\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2e051a elementor-widget elementor-widget-heading\" data-id=\"a2e051a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Zaawansowana ochrona sieci UTM:<\/b> zintegrowana technologia bezpiecze\u0144stwa <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70c1de5 elementor-widget elementor-widget-text-editor\" data-id=\"70c1de5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bezpiecze\u0144stwo sieci komputerowej jest kwesti\u0105 niezwykle wa\u017cn\u0105 z\u00a0wielu powod\u00f3w. Przede wszystkim, to\u00a0g\u0142\u00f3wny czynnik wp\u0142ywaj\u0105cy na\u00a0ochron\u0119 danych przechowywanych w\u00a0sieci. Dodatkowo, odpowiednie zabezpieczenia, takie jak rozwi\u0105zania klasy UTM, mog\u0105 poprawi\u0107 wydajno\u015b\u0107 korzystania z\u00a0zasob\u00f3w sieciowych poprzez zastosowanie mechanizm\u00f3w filtruj\u0105cych. Rozwi\u0105zania te\u00a0integruj\u0105 wiele funkcji w\u00a0jednym urz\u0105dzeniu, takich jak: firewall, koncentrator VPN, czy\u00a0kontrola zawarto\u015bci stron internetowych.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e66889a elementor-widget elementor-widget-heading\" data-id=\"e66889a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e5453b e-con-full e-flex e-con e-child\" data-id=\"9e5453b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8dfadf6 elementor-widget elementor-widget-image\" data-id=\"8dfadf6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"97\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1024x124.webp\" class=\"attachment-large size-large wp-image-118\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1024x124.webp 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-300x36.webp 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-768x93.webp 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1536x186.webp 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-2048x248.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5893077 elementor-widget elementor-widget-image\" data-id=\"5893077\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"375\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/logo-stormshield-big.png\" class=\"attachment-large size-large wp-image-119\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/logo-stormshield-big.png 1000w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/logo-stormshield-big-300x141.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/logo-stormshield-big-768x360.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0fe896 elementor-widget elementor-widget-spacer\" data-id=\"a0fe896\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de9ede4 e-con-full e-flex e-con e-child\" data-id=\"de9ede4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91a8e98 elementor-widget__width-initial elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"91a8e98\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/24.jpg\" class=\"attachment-large size-large wp-image-145\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/24.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/24-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/24-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e45ba75 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e45ba75\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b6a77e elementor-widget elementor-widget-spacer\" data-id=\"8b6a77e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebad593 elementor-widget elementor-widget-heading\" data-id=\"ebad593\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Disaster Recovery:<\/b> bezpieczne przechowywanie i odzyskiwanie danych<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-378e227 elementor-widget elementor-widget-text-editor\" data-id=\"378e227\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u015awiadomo\u015b\u0107 o konieczno\u015bci backupowania danych oraz zapewnienia dost\u0119pu do kopii jest niezwykle istotna. Sieci komputerowe, na kt\u00f3rych opiera si\u0119 funkcjonowanie zak\u0142ad\u00f3w wodoci\u0105g\u00f3w, mog\u0105 nieprzewidzianie zawie\u015b\u0107 w dowolnym momencie, co mo\u017ce prowadzi\u0107 do potencjalnych przerw w dzia\u0142aniu system\u00f3w. Systematyczne tworzenie kopii zapasowych, skutecznie zminimalizuje ryzyko utraty wa\u017cnych informacji w przypadku awarii lub incydentu. Dost\u0119pno\u015b\u0107 aktualnych kopii danych pozwala na szybkie przywr\u00f3cenie dzia\u0142ania system\u00f3w, co jest kluczowe dla zachowania ci\u0105g\u0142o\u015bci pracy i niezak\u0142\u00f3conej obs\u0142ugi proces\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707b174 elementor-widget elementor-widget-heading\" data-id=\"707b174\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0e4b9a e-con-full e-flex e-con e-child\" data-id=\"f0e4b9a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fe527 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e6fe527\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"160\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg.png\" class=\"attachment-full size-full wp-image-88\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg.png 1280w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-300x38.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-1024x128.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Dell_Technologies_logo.svg-768x96.png 768w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb8b9b3 elementor-widget-mobile__width-initial elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"eb8b9b3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"72\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Synology-logo.png\" class=\"attachment-large size-large wp-image-124\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a3ca4c elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"3a3ca4c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"136\" height=\"72\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Synology-logo.png\" class=\"attachment-large size-large wp-image-124\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-beee664 e-con-full e-flex e-con e-child\" data-id=\"beee664\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ef586e elementor-hidden-mobile elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"0ef586e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"172\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/logo_QNAP_LOGO_standard-1024x220.png\" class=\"attachment-large size-large wp-image-390\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/logo_QNAP_LOGO_standard-1024x220.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/logo_QNAP_LOGO_standard-300x64.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/logo_QNAP_LOGO_standard-768x165.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/logo_QNAP_LOGO_standard.png 1460w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4389fc9 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"4389fc9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"300\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-1024x384.png\" class=\"attachment-large size-large wp-image-122\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-1024x384.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-300x113.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-768x288.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-1536x576.png 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Acronis.svg-2048x768.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fd8cb4 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"5fd8cb4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"148\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Veeam_logo.png\" class=\"attachment-large size-large wp-image-121\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Veeam_logo.png 500w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Veeam_logo-300x89.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c65b2d8 elementor-widget elementor-widget-spacer\" data-id=\"c65b2d8\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5797270 e-con-full e-flex e-con e-child\" data-id=\"5797270\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4e079 elementor-widget elementor-widget-image\" data-id=\"7d4e079\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/zasilanie.jpg\" class=\"attachment-large size-large wp-image-147\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/zasilanie.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/zasilanie-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/zasilanie-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cc7156 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9cc7156\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bc4039 elementor-widget elementor-widget-heading\" data-id=\"2bc4039\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Zasilanie awaryjne: <\/b>bezpieczne zasilanie serwerowni<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9e510f elementor-widget elementor-widget-text-editor\" data-id=\"c9e510f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zastosowanie zasilaczy awaryjnych UPS w\u00a0serwerowni jest kluczowe dla bezpiecze\u0144stwa sprz\u0119tu. Zabezpieczaj\u0105 serwery przed\u00a0nag\u0142ymi przerwami w\u00a0dostawie pr\u0105du, takimi jak awarie sieci elektrycznej. Zasilacze UPS minimalizuj\u0105 ryzyko uszkodze\u0144 sprz\u0119tu spowodowanych przepi\u0119ciami czy\u00a0skokami napi\u0119\u0107. Odpowiednie zabezpieczenia s\u0105\u00a0nieodzowne dla zapewnienia niezawodno\u015bci i\u00a0ci\u0105g\u0142o\u015bci dzia\u0142ania serwer\u00f3w w\u00a0obliczu niespodziewanych sytuacji. W\u00a0serwerowni nie\u00a0mo\u017ce zabrakn\u0105\u0107 takiego rozwi\u0105zania, aby m\u00f3c skutecznie odpowiada\u0107 na\u00a0zmienne warunki zasilania.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5778dc elementor-widget elementor-widget-heading\" data-id=\"b5778dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a279cad e-con-full e-flex e-con e-child\" data-id=\"a279cad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d413562 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"d413562\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"818\" height=\"367\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ever-logo.png\" class=\"attachment-full size-full wp-image-125\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ever-logo.png 818w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ever-logo-300x135.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ever-logo-768x345.png 768w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58b13a5 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"58b13a5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"183\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/cyberpower-logo.webp\" class=\"attachment-full size-full wp-image-132\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/cyberpower-logo.webp 600w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/cyberpower-logo-300x92.webp 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2683875 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"2683875\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/apc-01-logo.png\" class=\"attachment-large size-large wp-image-131\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/apc-01-logo.png 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/apc-01-logo-300x225.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/apc-01-logo-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8739fa elementor-widget elementor-widget-spacer\" data-id=\"e8739fa\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2ff034 e-con-full e-flex e-con e-child\" data-id=\"c2ff034\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-500014e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-image\" data-id=\"500014e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/14.jpg\" class=\"attachment-large size-large wp-image-148\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/14.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/14-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/14-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15f7590 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"15f7590\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbecdf2 elementor-widget elementor-widget-spacer\" data-id=\"cbecdf2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62232a4 elementor-widget elementor-widget-heading\" data-id=\"62232a4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Oprogramowanie do zbierania i analizowania log\u00f3w:<\/b> centralne monitorowanie i analiza zdarze\u0144<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a12a83a elementor-widget elementor-widget-text-editor\" data-id=\"a12a83a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Oprogramowanie do zbierania i analizy log\u00f3w pozwala monitorowa\u0107 zdarzenia w systemach, identyfikowa\u0107 nieprawid\u0142owo\u015bci oraz szybko reagowa\u0107 na incydenty. Dzi\u0119ki centralizacji log\u00f3w z r\u00f3\u017cnych \u017ar\u00f3de\u0142 \u2013 takich jak serwery, aplikacje, urz\u0105dzenia sieciowe \u2013 mo\u017cliwa jest kompleksowa analiza aktywno\u015bci w infrastrukturze IT. Wykrycie pr\u00f3b nieautoryzowanego dost\u0119pu, b\u0142\u0119d\u00f3w w aplikacjach czy przeci\u0105\u017ce\u0144 systemowych staje si\u0119 znacznie \u0142atwiejsze.\u00a0Regularna analiza log\u00f3w umo\u017cliwia proaktywne dzia\u0142ania, a nie tylko reakcj\u0119 po wyst\u0105pieniu incydentu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00387fe elementor-widget elementor-widget-heading\" data-id=\"00387fe\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-238ab71 e-con-full e-flex e-con e-child\" data-id=\"238ab71\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2ed44 elementor-widget elementor-widget-image\" data-id=\"3e2ed44\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"258\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-1024x330.png\" class=\"attachment-large size-large wp-image-333\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-1024x330.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-300x97.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-768x247.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-1536x494.png 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Graylog_logo.svg-2048x659.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d416e76 elementor-widget elementor-widget-image\" data-id=\"d416e76\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"97\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1024x124.webp\" class=\"attachment-large size-large wp-image-118\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1024x124.webp 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-300x36.webp 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-768x93.webp 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-1536x186.webp 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/Fortinet_logo-1-2048x248.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3397d6 elementor-widget elementor-widget-image\" data-id=\"e3397d6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Sekoia_logo1-1024x682.png\" class=\"attachment-large size-large wp-image-334\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Sekoia_logo1-1024x682.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Sekoia_logo1-300x200.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Sekoia_logo1-768x512.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Sekoia_logo1.png 1400w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59e0997 elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-spacer\" data-id=\"59e0997\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66803d6 e-con-full e-flex e-con e-child\" data-id=\"66803d6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b48583 elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"4b48583\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"382\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/15-1024x489.jpg\" class=\"attachment-large size-large wp-image-149\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/15-1024x489.jpg 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/15-300x143.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/15-768x367.jpg 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/15.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7a1751 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a7a1751\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8dce54 elementor-widget elementor-widget-spacer\" data-id=\"e8dce54\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd1b762 elementor-widget elementor-widget-heading\" data-id=\"fd1b762\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Systemy antywirusowe &amp; EDR: <\/b>zidentyfikuj zagro\u017cenie i dzia\u0142aj szybko eliminuj\u0105c przyczyny<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e04fe2 elementor-widget elementor-widget-text-editor\" data-id=\"4e04fe2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W\u00a0bran\u017cy IT kluczowe jest natychmiastowe reagowanie i\u00a0w\u0142a\u015bciwa diagnoza zagro\u017ce\u0144. Konwencjonalne oprogramowanie antywirusowe dzia\u0142a tylko\u00a0na\u00a0objawy, a\u00a0nie\u00a0leczy przyczyny. Aby unika\u0107 atak\u00f3w, nale\u017cy dostrzec wektor ich zagro\u017cenia oraz\u00a0nasz\u0105 podatno\u015b\u0107, a\u00a0nast\u0119pnie dzia\u0142a\u0107 szybko. Odpowiednie narz\u0119dzia to\u00a0rozwi\u0105zania klasy EDR.<br \/><br \/>Proponowane przez\u00a0nas oprogramowania s\u0105\u00a0zoptymalizowane dla sieci urz\u0119dowych, co\u00a0potwierdzamy na\u00a0podstawie w\u0142asnego do\u015bwiadczenia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-662fb5f elementor-widget elementor-widget-heading\" data-id=\"662fb5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-866f93f e-con-full e-flex e-con e-child\" data-id=\"866f93f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb92f5 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"bcb92f5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"314\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo.png\" class=\"attachment-large size-large wp-image-90\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo.png 794w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo-300x119.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ESET-Logo-768x304.png 768w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f3d507 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"6f3d507\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"131\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/bitdefender-logo-1.png\" class=\"attachment-large size-large wp-image-135\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1007d1f elementor-widget elementor-widget-spacer\" data-id=\"1007d1f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e42135b elementor-hidden-mobile elementor-widget elementor-widget-spacer\" data-id=\"e42135b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4550b0 elementor-hidden-mobile elementor-widget elementor-widget-spacer\" data-id=\"a4550b0\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1181f4 e-con-full e-flex e-con e-child\" data-id=\"e1181f4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec85c08 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"ec85c08\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"543\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ochrona.jpg\" class=\"attachment-large size-large wp-image-150\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ochrona.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ochrona-300x204.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/ochrona-768x521.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e2d866 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3e2d866\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a8eeaa elementor-widget elementor-widget-spacer\" data-id=\"0a8eeaa\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc25643 elementor-widget elementor-widget-heading\" data-id=\"cc25643\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Rozwi\u0105zania DLP | PAM:<\/b> chro\u0144 dane przed wyciekiem i zarz\u0105dzaj dost\u0119pem do nich<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c807787 elementor-widget elementor-widget-text-editor\" data-id=\"c807787\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Posiadamy znaczne do\u015bwiadczenie w \u015bwiadczeniu us\u0142ug dla urz\u0119d\u00f3w samorz\u0105dowych. Dlatego chcieliby\u015bmy poleci\u0107 dwa typy rozwi\u0105za\u0144 \u2013 DLP i PAM. Zalecamy korzystanie z zaufanych rozwi\u0105za\u0144, takich jak\u00a0<b data-stringify-type=\"bold\">Safetica<\/b>\u00a0(DLP) i\u00a0<b data-stringify-type=\"bold\">Senhasegura<\/b>\u00a0(PAM), kt\u00f3re s\u0105 uznane na rynku. Te rozwi\u0105zania charakteryzuj\u0105 si\u0119 r\u00f3wnie\u017c prostot\u0105 wdro\u017cenia i \u0142atwo\u015bci\u0105 u\u017cytkowania.<br \/>\u00a0Pozwalaj\u0105 skutecznie zabezpiecza\u0107 poufne dane oraz kontrolowa\u0107 dost\u0119p do kluczowych zasob\u00f3w systemowych. Dodatkowo umo\u017cliwiaj\u0105 spe\u0142nienie wymaga\u0144 audytowych i zwi\u0119kszenie przejrzysto\u015bci dzia\u0142a\u0144 u\u017cytkownik\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7dc212 elementor-widget elementor-widget-heading\" data-id=\"b7dc212\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e2a30a e-con-full e-flex e-con e-child\" data-id=\"6e2a30a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd2b6b elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"ccd2b6b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"182\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/safetica-logo-1000px-1.png\" class=\"attachment-large size-large wp-image-137\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/safetica-logo-1000px-1.png 1000w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/safetica-logo-1000px-1-300x68.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/safetica-logo-1000px-1-768x175.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-236b410 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"236b410\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"148\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/segura-logo-green-1024x189.png\" class=\"attachment-large size-large wp-image-138\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/segura-logo-green-1024x189.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/segura-logo-green-300x55.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/segura-logo-green-768x141.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/segura-logo-green.png 1352w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-868af70 elementor-widget elementor-widget-spacer\" data-id=\"868af70\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dde1b01 e-con-full e-flex e-con e-child\" data-id=\"dde1b01\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-346c6da elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"346c6da\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"663\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/img.jpg\" class=\"attachment-large size-large wp-image-151\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/img.jpg 1000w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/img-300x249.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/img-768x637.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d648547 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"d648547\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ec58a8 elementor-widget elementor-widget-spacer\" data-id=\"7ec58a8\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-241dd38 elementor-widget elementor-widget-heading\" data-id=\"241dd38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Inwentaryzacja sieci: <\/b> kontrola zasob\u00f3w IT i zgodno\u015b\u0107 z wymogami<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e1316d elementor-widget elementor-widget-text-editor\" data-id=\"9e1316d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"message-list_1750764105.509609\" class=\"c-virtual_list__item\" tabindex=\"0\" role=\"listitem\" aria-setsize=\"-1\" data-qa=\"virtual-list-item\" data-item-key=\"1750764105.509609\"><div class=\"c-message_kit__background p-message_pane_message__message c-message_kit__message\" role=\"presentation\" data-qa=\"message_container\" data-qa-unprocessed=\"false\" data-qa-placeholder=\"false\"><div class=\"c-message_kit__hover\" role=\"document\" aria-roledescription=\"message\" data-qa-hover=\"true\"><div class=\"c-message_kit__actions c-message_kit__actions--above\"><div class=\"c-message_kit__gutter\"><div class=\"c-message_kit__gutter__right\" role=\"presentation\" data-qa=\"message_content\"><div class=\"c-message_kit__blocks c-message_kit__blocks--rich_text\"><div class=\"c-message__message_blocks c-message__message_blocks--rich_text\" data-qa=\"message-text\"><div class=\"p-block_kit_renderer\" data-qa=\"block-kit-renderer\"><div class=\"p-block_kit_renderer__block_wrapper p-block_kit_renderer__block_wrapper--first\"><div class=\"p-rich_text_block\" dir=\"auto\"><div class=\"p-rich_text_section\">Regularnie prowadzona inwentaryzacja infrastruktury sieciowej daje mo\u017cliwo\u015b\u0107 \u015bledzenia zmian w czasie, co pozwala szybko wykry\u0107 odchylenia od standard\u00f3w, b\u0142\u0119dne konfiguracje lub pojawienie si\u0119 nieautoryzowanych komponent\u00f3w. U\u0142atwia tak\u017ce planowanie modernizacji sprz\u0119tu, analiz\u0119 wydajno\u015bci zasob\u00f3w oraz optymalizacj\u0119 koszt\u00f3w utrzymania \u015brodowiska IT. Narz\u0119dzia wspieraj\u0105ce inwentaryzacj\u0119 umo\u017cliwiaj\u0105 automatyczne wykrywanie urz\u0105dze\u0144 w sieci, tworzenie szczeg\u00f3\u0142owych raport\u00f3w oraz integracj\u0119 z innymi systemami zarz\u0105dzania.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"message-list_bottomSpacer\" class=\"c-virtual_list__item\" tabindex=\"-1\" role=\"presentation\" aria-setsize=\"-1\" data-qa=\"virtual-list-item\" data-item-key=\"bottomSpacer\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5398f4f elementor-widget elementor-widget-heading\" data-id=\"5398f4f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Zapoznaj si\u0119 z produktami:<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-521280c e-con-full e-flex e-con e-child\" data-id=\"521280c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3eda6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"fb3eda6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"70\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/statlook-logo-e1750254724304.png\" class=\"attachment-large size-large wp-image-332\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/statlook-logo-e1750254724304.png 350w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/statlook-logo-e1750254724304-300x60.png 300w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-318610f elementor-widget elementor-widget-image\" data-id=\"318610f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"280\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Axence-logo-1024x358.png\" class=\"attachment-large size-large wp-image-330\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Axence-logo-1024x358.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Axence-logo-300x105.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Axence-logo-768x268.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Axence-logo.png 1210w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-150dfd3 elementor-widget elementor-widget-image\" data-id=\"150dfd3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"378\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/IT-MANAGER.webp\" class=\"attachment-large size-large wp-image-331\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/IT-MANAGER.webp 1000w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/IT-MANAGER-300x142.webp 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/IT-MANAGER-768x363.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3f15ff e-con-full e-flex e-con e-child\" data-id=\"e3f15ff\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6618527 elementor-widget__width-initial elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"6618527\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/08.jpg\" class=\"attachment-large size-large wp-image-152\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/08.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/08-300x200.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/08-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-697e89d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"697e89d\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83cf27d elementor-widget elementor-widget-spacer\" data-id=\"83cf27d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a70e775 elementor-widget elementor-widget-heading\" data-id=\"a70e775\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><b>Outsourcing us\u0142ug IT:<\/b> bezpieczne wdro\u017cenia<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8834dc8 elementor-widget elementor-widget-text-editor\" data-id=\"8834dc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wspieramy przedsi\u0119biorstwa nie\u00a0tylko\u00a0w\u00a0tworzeniu strategii cyberbezpiecze\u0144stwa, ale\u00a0r\u00f3wnie\u017c we\u00a0wdro\u017ceniu konkretnych system\u00f3w zabezpiecze\u0144. Nasza wiedza na\u00a0temat zarz\u0105dzania procesami biznesowymi oraz\u00a0aktualnych zagro\u017ce\u0144 cybernetycznych \u0142\u0105czy si\u0119 z do\u015bwiadczeniem naszych in\u017cynier\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2add415 elementor-widget elementor-widget-image\" data-id=\"2add415\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"192\" height=\"192\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/xcropped-fav-192x192.png.pagespeed.ic_.bhn-ou3ryc.webp\" class=\"attachment-large size-large wp-image-140\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/xcropped-fav-192x192.png.pagespeed.ic_.bhn-ou3ryc.webp 192w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/xcropped-fav-192x192.png.pagespeed.ic_.bhn-ou3ryc-150x150.webp 150w\" sizes=\"(max-width: 192px) 100vw, 192px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-811a57a e-flex e-con-boxed e-con e-parent\" data-id=\"811a57a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f44d3dc elementor-widget elementor-widget-spacer\" data-id=\"f44d3dc\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c38ec0b e-flex e-con-boxed e-con e-parent\" data-id=\"c38ec0b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d23e84e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"d23e84e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/atcomp.pl\/baza-wiedzy\/ankiety\/ankieta-cyberbezpieczne-wodociagi\/\">Wype\u0142nij ankiet\u0119 <\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da67b2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1da67b2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select.png\" class=\"attachment-large size-large wp-image-488\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select.png 512w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select-300x300.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/select-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1edff8c e-flex e-con-boxed e-con e-parent\" data-id=\"1edff8c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a10beea elementor-widget elementor-widget-spacer\" data-id=\"a10beea\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29693eb e-flex e-con-boxed e-con e-parent\" data-id=\"29693eb\" data-element_type=\"container\" id=\"dlaczego-my\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2679d2f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"2679d2f\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c83987 elementor-widget elementor-widget-heading\" data-id=\"0c83987\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dlaczego my?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b81b305 elementor-widget elementor-widget-text-editor\" data-id=\"b81b305\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AT\u00a0Computers to\u00a0firma, kt\u00f3ra\u00a0oferuje rozwi\u0105zania i\u00a0us\u0142ugi z\u00a0zakresu IT dla firm i\u00a0instytucji publicznych, maj\u0105cych na\u00a0celu usprawnienie codziennych dzia\u0142a\u0144 poprzez wykorzystanie prostego i\u00a0intuicyjnego systemu informatycznego.<\/p><p>Od 19 lat pomagamy klientom w maksymalnym wykorzystaniu potencja\u0142u \u015brodowiska teleinformatycznego w celu ochrony ich zasob\u00f3w, zwi\u0119kszenia efektywno\u015bci pracy oraz obni\u017cenia koszt\u00f3w utrzymania infrastruktury IT. Posiadamy jedne z najwy\u017cszych status\u00f3w partnerskich w Polsce dla takich marek jak Eset, Dell oraz Synology, Qnap, kt\u00f3re s\u0105 potwierdzeniem wysokiego poziomu naszych kompetencji.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d0c92a e-con-full e-flex e-con e-child\" data-id=\"5d0c92a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8324828 elementor-widget elementor-widget-image\" data-id=\"8324828\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/07.jpg\" class=\"attachment-large size-large wp-image-92\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/07.jpg 800w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/07-300x300.jpg 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/07-150x150.jpg 150w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/05\/07-768x768.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd7c4ff elementor-hidden-desktop e-flex e-con-boxed e-con e-parent\" data-id=\"dd7c4ff\" data-element_type=\"container\" id=\"formularzm\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e53c8ba e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e53c8ba\" data-element_type=\"container\" id=\"formularzm\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51180a1 elementor-widget elementor-widget-spacer\" data-id=\"51180a1\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b1c7b5 elementor-widget elementor-widget-heading\" data-id=\"1b1c7b5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wype\u0142nij formularz<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98a765a elementor-widget__width-inherit elementor-widget elementor-widget-shortcode\" data-id=\"98a765a\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f257-o2\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"257\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F44#wpcf7-f257-o2\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"257\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f257-o2\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"imie\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Imi\u0119 i nazwisko\" value=\"\" type=\"text\" name=\"imie\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"jednostka\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nazwa jednostki\" value=\"\" type=\"text\" name=\"jednostka\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"telefon\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Numer telefonu\" value=\"\" type=\"tel\" name=\"telefon\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-col\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Adres e-mail\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<p class=\"privacy-info\"><br \/>\nDane osobowe podane w formularzu b\u0119d\u0105 przetwarzane w celu realizacji Twojego wniosku, zgodnie z jego zakresem, wed\u0142ug zasad zawartych w dokumencie pod nazw\u0105 <a href=\"https:\/\/atcomp.pl\/polityka-prywatnosci\/\" target=\"_blank\">Polityka Prywatno\u015bci<\/a>.\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"polityka\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"polityka[]\" value=\"*O\u015bwiadczam, \u017ce zapozna\u0142am\/-\u0142em si\u0119 z Polityk\u0105 Prywatno\u015bci.\" \/><span class=\"wpcf7-list-item-label\">*O\u015bwiadczam, \u017ce zapozna\u0142am\/-\u0142em si\u0119 z Polityk\u0105 Prywatno\u015bci.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"zgoda1\"><span class=\"wpcf7-form-control wpcf7-checkbox wpcf7-validates-as-required\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"zgoda1[]\" value=\"*Wyra\u017cam zgod\u0119 na przetwarzanie moich danych osobowych w celu kontaktu ze mn\u0105 przedstawiciela AT Computers w zwi\u0105zku z interesuj\u0105cymi mnie produktami lub us\u0142ugami.\" \/><span class=\"wpcf7-list-item-label\">*Wyra\u017cam zgod\u0119 na przetwarzanie moich danych osobowych w celu kontaktu ze mn\u0105 przedstawiciela AT Computers w zwi\u0105zku z interesuj\u0105cymi mnie produktami lub us\u0142ugami.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p class=\"checkbox-group\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"zgoda2\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first last\"><label><input type=\"checkbox\" name=\"zgoda2[]\" value=\"Wyra\u017cam zgod\u0119 na przesy\u0142anie informacji handlowych za pomoc\u0105 \u015brodk\u00f3w komunikacji elektronicznej w rozumieniu ustawy z dnia 18 lipca 2002 roku o \u015bwiadczenie us\u0142ug drog\u0105 elektroniczn\u0105 (Dz.U.2017.1219 t.j.) na podany adres e-mail na temat us\u0142ug oferowanych przez AT Computers. Zgoda jest dobrowolna i mo\u017ce by\u0107 w ka\u017cdej chwili wycofana, klikaj\u0105c w odpowiedni link na ko\u0144cu wiadomo\u015bci e-mail. Wycofanie zgody nie wp\u0142ywa na zgodno\u015b\u0107 z prawem przetwarzania, kt\u00f3rego dokonano na podstawie zgody przez jej wycofaniem.\" \/><span class=\"wpcf7-list-item-label\">Wyra\u017cam zgod\u0119 na przesy\u0142anie informacji handlowych za pomoc\u0105 \u015brodk\u00f3w komunikacji elektronicznej w rozumieniu ustawy z dnia 18 lipca 2002 roku o \u015bwiadczenie us\u0142ug drog\u0105 elektroniczn\u0105 (Dz.U.2017.1219 t.j.) na podany adres e-mail na temat us\u0142ug oferowanych przez AT Computers. Zgoda jest dobrowolna i mo\u017ce by\u0107 w ka\u017cdej chwili wycofana, klikaj\u0105c w odpowiedni link na ko\u0144cu wiadomo\u015bci e-mail. Wycofanie zgody nie wp\u0142ywa na zgodno\u015b\u0107 z prawem przetwarzania, kt\u00f3rego dokonano na podstawie zgody przez jej wycofaniem.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"WY\u015aLIJ\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55851e4 e-flex e-con-boxed e-con e-parent\" data-id=\"55851e4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33e299a elementor-widget elementor-widget-spacer\" data-id=\"33e299a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7307751 e-flex e-con-boxed e-con e-parent\" data-id=\"7307751\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fa2d351 e-con-full e-flex e-con e-child\" data-id=\"fa2d351\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-451be88 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"451be88\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1748f71 elementor-widget elementor-widget-heading\" data-id=\"1748f71\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Skontaktuj si\u0119 z nami lub zostaw swoje dane.\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a1d2f7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4a1d2f7\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40404fe elementor-widget elementor-widget-text-editor\" data-id=\"40404fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nasz przedstawiciel pomo\u017ce Ci dobra\u0107 ofert\u0119.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8fb4d5 e-con-full e-flex e-con e-child\" data-id=\"a8fb4d5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9ea6b elementor-hidden-mobile elementor-invisible elementor-widget elementor-widget-button\" data-id=\"9d9ea6b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#formularz\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PRZEJD\u0179 DO FORMULARZA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a431aa5 elementor-hidden-desktop elementor-hidden-tablet elementor-invisible elementor-widget elementor-widget-button\" data-id=\"a431aa5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#formularzm\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PRZEJD\u0179 DO FORMULARZA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2181cfb e-flex e-con-boxed e-con e-parent\" data-id=\"2181cfb\" data-element_type=\"container\" id=\"kontakt\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd6dc23 e-con-full e-flex e-con e-child\" data-id=\"cd6dc23\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fe96342 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"fe96342\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d29a50 elementor-widget elementor-widget-image\" data-id=\"0d29a50\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/atcomp.pl\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"233\" src=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big-1024x298.png\" class=\"attachment-large size-large wp-image-16\" alt=\"\" srcset=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big-1024x298.png 1024w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big-300x87.png 300w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big-768x224.png 768w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big-1536x447.png 1536w, https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/04\/logo_poziom_big.png 1905w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f526f7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6f526f7\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b9dea8 elementor-widget elementor-widget-text-editor\" data-id=\"9b9dea8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>AT Computers s.c.<br \/>ul. Pozna\u0144ska 16a<br \/>62-020 Swarz\u0119dz<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ea163a e-con-full e-flex e-con e-child\" data-id=\"1ea163a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8dadbd6 elementor-widget elementor-widget-text-editor\" data-id=\"8dadbd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>Telefon:\u00a0<a href=\"tel:616256857\">61 625 68 57<\/a><br>\nE-mail:\u00a0<a href=\"mailto:biuro@atcomp.pl\">biuro@atcomp.pl<\/a><br>\nwww.atcomp.pl<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8bb00e e-con-full e-flex e-con e-child\" data-id=\"e8bb00e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d406a90 elementor-invisible elementor-widget elementor-widget-button\" data-id=\"d406a90\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/atcomp.pl\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">ATCOMP.PL <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Chro\u0144 wodoci\u0105gi! Zadbaj o bezpiecze\u0144stwo cyfrowe Twojej infrastruktury wodoci\u0105gowo-kanalizacyjnej z pomoc\u0105 ekspert\u00f3w z AT Computers.\u00a0 Zostaw swoje dane, a my\u00a0skontaktujemy si\u0119 z\u00a0Tob\u0105! WYPE\u0141NIJ FORMULARZ Wype\u0142nij formularz Nowy konkurs grantowy KPO \u2014 &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;\u00a0 Ministerstwo Cyfryzacji og\u0142osi\u0142o uruchomienie programu grantowego &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;, kt\u00f3rego celem jest wsparcie przedsi\u0119biorstw wodoci\u0105gowo-kanalizacyjnych w dostosowaniu si\u0119 do wymaga\u0144 dyrektywy NIS2 oraz [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberbezpiecznewodociagi.pl\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers\" \/>\n<meta property=\"og:description\" content=\"Chro\u0144 wodoci\u0105gi! Zadbaj o bezpiecze\u0144stwo cyfrowe Twojej infrastruktury wodoci\u0105gowo-kanalizacyjnej z pomoc\u0105 ekspert\u00f3w z AT Computers.\u00a0 Zostaw swoje dane, a my\u00a0skontaktujemy si\u0119 z\u00a0Tob\u0105! WYPE\u0141NIJ FORMULARZ Wype\u0142nij formularz Nowy konkurs grantowy KPO \u2014 &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;\u00a0 Ministerstwo Cyfryzacji og\u0142osi\u0142o uruchomienie programu grantowego &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;, kt\u00f3rego celem jest wsparcie przedsi\u0119biorstw wodoci\u0105gowo-kanalizacyjnych w dostosowaniu si\u0119 do wymaga\u0144 dyrektywy NIS2 oraz [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberbezpiecznewodociagi.pl\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberbezpieczne Wodocigi | AT Computers\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T10:37:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1460\" \/>\n\t<meta property=\"og:image:height\" content=\"616\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/\",\"url\":\"https:\/\/cyberbezpiecznewodociagi.pl\/\",\"name\":\"Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers\",\"isPartOf\":{\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png\",\"datePublished\":\"2025-04-24T13:32:15+00:00\",\"dateModified\":\"2025-09-24T10:37:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberbezpiecznewodociagi.pl\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage\",\"url\":\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png\",\"contentUrl\":\"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png\",\"width\":1460,\"height\":616},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberbezpiecznewodociagi.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wodoci\u0105gi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberbezpiecznewodociagi.pl\/#website\",\"url\":\"https:\/\/cyberbezpiecznewodociagi.pl\/\",\"name\":\"Cyberbezpieczne Wodocigi | AT Computers\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberbezpiecznewodociagi.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberbezpiecznewodociagi.pl\/","og_locale":"pl_PL","og_type":"article","og_title":"Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers","og_description":"Chro\u0144 wodoci\u0105gi! Zadbaj o bezpiecze\u0144stwo cyfrowe Twojej infrastruktury wodoci\u0105gowo-kanalizacyjnej z pomoc\u0105 ekspert\u00f3w z AT Computers.\u00a0 Zostaw swoje dane, a my\u00a0skontaktujemy si\u0119 z\u00a0Tob\u0105! WYPE\u0141NIJ FORMULARZ Wype\u0142nij formularz Nowy konkurs grantowy KPO \u2014 &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;\u00a0 Ministerstwo Cyfryzacji og\u0142osi\u0142o uruchomienie programu grantowego &#8222;Cyberbezpieczne Wodoci\u0105gi&#8221;, kt\u00f3rego celem jest wsparcie przedsi\u0119biorstw wodoci\u0105gowo-kanalizacyjnych w dostosowaniu si\u0119 do wymaga\u0144 dyrektywy NIS2 oraz [&hellip;]","og_url":"https:\/\/cyberbezpiecznewodociagi.pl\/","og_site_name":"Cyberbezpieczne Wodocigi | AT Computers","article_modified_time":"2025-09-24T10:37:14+00:00","og_image":[{"width":1460,"height":616,"url":"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"16 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberbezpiecznewodociagi.pl\/","url":"https:\/\/cyberbezpiecznewodociagi.pl\/","name":"Wodoci\u0105gi - Cyberbezpieczne Wodocigi | AT Computers","isPartOf":{"@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage"},"image":{"@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png","datePublished":"2025-04-24T13:32:15+00:00","dateModified":"2025-09-24T10:37:14+00:00","breadcrumb":{"@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberbezpiecznewodociagi.pl\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#primaryimage","url":"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png","contentUrl":"https:\/\/cyberbezpiecznewodociagi.pl\/wp-content\/uploads\/2025\/06\/Dodaj-naglowek-2.png","width":1460,"height":616},{"@type":"BreadcrumbList","@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberbezpiecznewodociagi.pl\/"},{"@type":"ListItem","position":2,"name":"Wodoci\u0105gi"}]},{"@type":"WebSite","@id":"https:\/\/cyberbezpiecznewodociagi.pl\/#website","url":"https:\/\/cyberbezpiecznewodociagi.pl\/","name":"Cyberbezpieczne Wodocigi | AT Computers","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberbezpiecznewodociagi.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"}]}},"_links":{"self":[{"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":389,"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":617,"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=\/wp\/v2\/pages\/44\/revisions\/617"}],"wp:attachment":[{"href":"https:\/\/cyberbezpiecznewodociagi.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}