{"id":3160,"date":"2022-12-22T12:48:50","date_gmt":"2022-12-22T12:48:50","guid":{"rendered":"http:\/\/the-codest.localhost\/blog\/cyber-security-dilemmas-data-leaks\/"},"modified":"2026-03-09T13:03:06","modified_gmt":"2026-03-09T13:03:06","slug":"dilemata-kyberneticke-bezpecnosti-uniky-dat","status":"publish","type":"post","link":"https:\/\/thecodest.co\/cs\/blog\/cyber-security-dilemmas-data-leaks\/","title":{"rendered":"Dilemata kybernetick\u00e9 bezpe\u010dnosti: \u00daniky dat"},"content":{"rendered":"<p>V\u00e1noce nejsou jenom sklizn\u00ed v maloobchod\u011b, ale tak\u00e9 hlavn\u00edm \u010dasem pro. <strong>kyberzlo\u010dinci<\/strong>. Pr\u00e1v\u011b v tomto ro\u010dn\u00edm obdob\u00ed<strong> hackersk\u00e9 \u00fatoky<\/strong> zam\u011b\u0159en\u00fdch na kr\u00e1de\u017e nebo phishing, p\u0159ib\u00fdv\u00e1. To p\u0159edstavuje probl\u00e9m nejen pro spot\u0159ebitele, ale tak\u00e9 pro spole\u010dnosti, pro kter\u00e9 je <strong><a href=\"https:\/\/thecodest.co\/cs\/blog\/app-data-collection-security-risks-value-and-types-explored\/\">data<\/a> \u00faniky<\/strong> znamenaj\u00ed finan\u010dn\u00ed ztr\u00e1ty a po\u0161kozen\u00ed pov\u011bsti. Pov\u00e1no\u010dn\u00ed obdob\u00ed je ide\u00e1ln\u00ed dobou k zamy\u0161len\u00ed nad t\u00edm, jak se mohou spole\u010dnosti chr\u00e1nit p\u0159ed \u00fanikem dat?<\/p>\n<ul>\n<li>Bezpe\u010dnost z\u00e1kazn\u00edk\u016f je sou\u010d\u00e1st\u00ed budov\u00e1n\u00ed d\u016fv\u011bry ve zna\u010dku<\/li>\n<li>Jak chr\u00e1nit sv\u00e1 data p\u0159i nakupov\u00e1n\u00ed online<\/li>\n<li>Monitorov\u00e1n\u00ed aplikac\u00ed a infrastruktury jako zp\u016fsob ochrany p\u0159ed \u00fanikem dat<\/li>\n<li>\u00danik \u00fadaj\u016f o z\u00e1kazn\u00edc\u00edch - hl\u00e1sit \u010di nehl\u00e1sit?<\/li>\n<li>Jak informujete sv\u00e9 z\u00e1kazn\u00edky o \u00faniku dat?<\/li>\n<\/ul>\n<h2>Bezpe\u010dn\u00e9 nakupov\u00e1n\u00ed v boji o z\u00e1kazn\u00edka<\/h2>\n<p>Posledn\u00ed roky v <a href=\"https:\/\/thecodest.co\/cs\/blog\/top-programming-languages-to-build-e-commerce\/\">e-commerce<\/a> byly dobou technologick\u00fdch \"z\u00e1vod\u016f ve zbrojen\u00ed\" o ka\u017ed\u00e9ho z\u00e1kazn\u00edka. Dnes u\u017e nenakupujeme pouze online, ale za\u017e\u00edv\u00e1me personalizovan\u00e9 nakupov\u00e1n\u00ed. To m\u00e1 usnadnit <a href=\"https:\/\/thecodest.co\/cs\/blog\/why-us-companies-are-opting-for-polish-developers\/\">n\u00e1s<\/a> doplnit n\u00e1\u0161 n\u00e1kupn\u00ed ko\u0161\u00edk a povzbudit n\u00e1s, abychom se na str\u00e1nky v budoucnu vr\u00e1tili. <\/p>\n<p>D\u016fle\u017eitou sou\u010d\u00e1st\u00ed v\u00fd\u0161e zm\u00edn\u011bn\u00e9ho pozitivn\u00edho z\u00e1\u017eitku z nakupov\u00e1n\u00ed je budov\u00e1n\u00ed d\u016fv\u011bry ve zna\u010dku. Sou\u010d\u00e1st\u00ed t\u00e9to d\u016fv\u011bry je zajistit, aby na\u0161i z\u00e1kazn\u00edci m\u011bli bezpe\u010dn\u00fd <strong>online nakupov\u00e1n\u00ed<\/strong> zku\u0161enosti. Toho m\u016f\u017eeme dos\u00e1hnout t\u00edm, \u017ee budeme u\u017eivatele vzd\u011bl\u00e1vat o hackersk\u00fdch hrozb\u00e1ch a investovat do n\u00e1stroj\u016f a technologi\u00ed, kter\u00e9 chr\u00e1n\u00ed p\u0159ed hackersk\u00fdmi \u00fatoky. <strong>kybernetick\u00e9 \u00fatoky<\/strong>.<\/p>\n<h2>Jak mohou z\u00e1kazn\u00edci chr\u00e1nit sv\u00e1 data?<\/h2>\n<p>Podle studie \"Spolehlivost internetov\u00fdch obchod\u016f\", kterou si nechaly vypracovat spole\u010dnosti ChronPESEL.pl a Rzetelna Firma, ka\u017ed\u00fd \u010dtvrt\u00fd respondent sly\u0161el o \u00faniku osobn\u00edch \u00fadaj\u016f z\u00e1kazn\u00edk\u016f z obchodu, kter\u00fd pou\u017e\u00edval. Na druhou stranu 6 % nakupuj\u00edc\u00edch na internetu uvedlo, \u017ee jejich \u00fadaje byly skute\u010dn\u011b zp\u0159\u00edstupn\u011bny neopr\u00e1vn\u011bn\u00fdm osob\u00e1m. Anal\u00fdza <strong>e-commerce<\/strong> statistiky o po\u010dtu nakupuj\u00edc\u00edch na internetu, v\u00edce ne\u017e 1,3 milionu lid\u00ed muselo \u0159e\u0161it takovou situaci.<\/p>\n<p>Co bychom m\u011bli z\u00e1kazn\u00edk\u016fm p\u0159ipomenout, aby se b\u011bhem p\u0159edv\u00e1no\u010dn\u00edho n\u00e1kupn\u00edho \u0161\u00edlenstv\u00ed v internetov\u00fdch obchodech c\u00edtili bezpe\u010dn\u011b? <\/p>\n<p>Nejprve upozorn\u011bme u\u017eivatele na\u0161ich webov\u00fdch str\u00e1nek na fale\u0161n\u00e9 e-shopy, zejm\u00e9na ty, kter\u00e9 se vyd\u00e1vaj\u00ed za jin\u00e9 str\u00e1nky. V\u00fdstra\u017en\u00e1 kontrolka by se m\u011bla rozsv\u00edtit, kdy\u017e se nab\u00eddky na konkr\u00e9tn\u00edm<strong> e-shop <\/strong>jsou nerealisticky atraktivn\u00ed nebo kdy\u017e str\u00e1nka sama o sob\u011b vypad\u00e1 podez\u0159ele. <\/p>\n<p>Za druh\u00e9, pou\u010dme na\u0161e z\u00e1kazn\u00edky o <strong>phishingov\u00e9 \u00fatoky<\/strong>. V p\u0159edv\u00e1no\u010dn\u00edm obdob\u00ed se mno\u017e\u00ed pokusy o z\u00edsk\u00e1n\u00ed d\u016fv\u011brn\u00fdch \u00fadaj\u016f prost\u0159ednictv\u00edm e-mail\u016f, telefon\u00e1t\u016f a textov\u00fdch zpr\u00e1v s informacemi o \u00fadajn\u011b nedokon\u010den\u00fdch n\u00e1kupn\u00edch transakc\u00edch nebo nezaplacen\u00fdch kur\u00fdrn\u00edch z\u00e1silk\u00e1ch. Varujte z\u00e1kazn\u00edky p\u0159ed klik\u00e1n\u00edm na podez\u0159el\u00e9 odkazy zaslan\u00e9 e-mailem nebo telefonicky a p\u0159ed sd\u011blov\u00e1n\u00edm osobn\u00edch nebo d\u016fv\u011brn\u00fdch informac\u00ed b\u011bhem telefonn\u00edch hovor\u016f. Podporujte bezpe\u010dn\u00e9 platby zalo\u017een\u00e9 na dvouf\u00e1zov\u00e9m ov\u011b\u0159ov\u00e1n\u00ed transakc\u00ed. <\/p>\n<h2>Jak chr\u00e1n\u00edme data na\u0161ich z\u00e1kazn\u00edk\u016f?<\/h2>\n<p>Vzd\u011bl\u00e1v\u00e1n\u00ed z\u00e1kazn\u00edk\u016f je jedna v\u011bc, ale zaji\u0161t\u011bn\u00ed jejich bezpe\u010dnosti na na\u0161ich webov\u00fdch str\u00e1nk\u00e1ch je samostatn\u00e1 z\u00e1le\u017eitost. V dne\u0161n\u00ed dob\u011b zv\u00fd\u0161en\u00e9 <strong>kybernetick\u00e1 trestn\u00e1 \u010dinnost<\/strong>, m\u011bli bychom b\u00fdt p\u0159ipraveni na <strong>hackersk\u00e9 \u00fatoky<\/strong> a jejich d\u016fsledky. Jak? Vyplat\u00ed se zav\u00e9st ve firm\u011b politiku v\u010dasn\u00e9ho odhalov\u00e1n\u00ed hrozeb a sledovat v\u00fdkonnost a zabezpe\u010den\u00ed firemn\u00edch aplikac\u00ed a infrastruktury. <\/p>\n<p>Na adrese <a href=\"https:\/\/thecodest.co\/cs\/blog\/vibrant-upturn-charting-the-resolute-rise-of-swedish-firms\/\">The Codest<\/a>, poskytujeme <strong>slu\u017eby pr\u016fb\u011b\u017en\u00e9ho monitorov\u00e1n\u00ed<\/strong> pro v\u00fdkonnost i bezpe\u010dnost IT syst\u00e9m\u016f zalo\u017een\u00fdch na vlastn\u00ed nebo cloudov\u00e9 infrastruktu\u0159e klienta (nebo na obou sou\u010dasn\u011b).<\/p>\n<p>Tento <strong>monitorovac\u00ed slu\u017eby<\/strong> se zam\u011b\u0159uje na v\u00fdkonnost provozovan\u00fdch syst\u00e9m\u016f z hlediska propustnosti, jako\u017e i na kvalitu integrace propojen\u00fdch informa\u010dn\u00edch syst\u00e9m\u016f. To zahrnuje tyto d\u016fle\u017eit\u00e9 aspekty<strong> e-commerce<\/strong> jako <a href=\"https:\/\/thecodest.co\/cs\/dictionary\/payment-gateways\/\">platebn\u00ed br\u00e1ny<\/a>, p\u0159epravn\u00ed syst\u00e9my a propojen\u00e9 syst\u00e9my CRM a ERP.<\/p>\n<p>Kl\u00ed\u010dov\u00fdm prvkem ochrany p\u0159ed \u00fanikem dat je pot\u0159eba testov\u00e1n\u00ed na<strong> hrozby kybernetick\u00fdch \u00fatok\u016f<\/strong> produk\u010dn\u00ed prost\u0159ed\u00ed, tj. prost\u0159ed\u00ed, kter\u00e9 je k dispozici koncov\u00e9mu z\u00e1kazn\u00edkovi. C\u00edlem pravideln\u00e9ho testov\u00e1n\u00ed je zachytit potenci\u00e1ln\u00ed zranitelnosti syst\u00e9m\u016f a umo\u017enit jejich opravu d\u0159\u00edve, ne\u017e dojde k incidentu. Ka\u017ed\u00e1 zm\u011bna a aktualizace v oblasti IT se p\u0159ed jej\u00edm zve\u0159ejn\u011bn\u00edm testuje, aby se zachytily chyby. <\/p>\n<p>Doty\u010dnou slu\u017ebou je <a href=\"https:\/\/thecodest.co\/services\/devops-engineers\/\">nep\u0159etr\u017eit\u00fd servis t\u00fdmu DevOps<\/a>, tj. program\u00e1torsk\u00e9 a provozn\u00ed sekce, kde se program\u00e1torsk\u00e9 i administrativn\u00ed kompetence staraj\u00ed o zaji\u0161t\u011bn\u00ed v\u00fdkonnosti a bezpe\u010dnosti podnikov\u00fdch aplikac\u00ed z\u00e1kazn\u00edk\u016f.<\/p>\n<p><a href=\"https:\/\/thecodest.co\/contact\"><img decoding=\"async\" src=\"\/app\/uploads\/2024\/05\/interested_in_continuous_monitoring_services_.png\" alt=\"tmav\u011b modr\u00fd text s r\u016f\u017eov\u00fdm tla\u010d\u00edtkem\" title=\"banner monitorovac\u00edch slu\u017eeb \" \/><\/a><\/p>\n<h2>\u00danik \u00fadaj\u016f o z\u00e1kazn\u00edc\u00edch - co \u0159\u00edk\u00e1 z\u00e1kon?<\/h2>\n<p>P\u0159ed \u00e9rou GDPR platila povinnost spr\u00e1vce informovat o <strong>\u00faniky dat<\/strong> byla nepovinn\u00e1, bez ohledu na rozsah hrozby. V sou\u010dasn\u00e9 dob\u011b, pokud je pravd\u011bpodobn\u00e9, \u017ee zve\u0159ejn\u011bn\u00ed \u00fadaj\u016f zp\u016fsob\u00ed zv\u00fd\u0161en\u00e9 riziko poru\u0161en\u00ed pr\u00e1v a svobod dot\u010den\u00fdch osob, je spr\u00e1vce povinen tyto osoby o \u00faniku nebo kr\u00e1de\u017ei \u00fadaj\u016f informovat. Tuto skute\u010dnost mus\u00edme rovn\u011b\u017e ozn\u00e1mit <strong>\u00da\u0159ad pro ochranu osobn\u00edch \u00fadaj\u016f<\/strong>. Zde v\u0161ak vyvst\u00e1v\u00e1 n\u011bkolik ot\u00e1zek. <\/p>\n<p>Za prv\u00e9, je na \u0159\u00eddic\u00ed jednotce, aby interpretovala, zda se jedn\u00e1 o <strong>\u00fanik dat<\/strong> se jedn\u00e1 o m\u00e9n\u011b z\u00e1va\u017en\u00fd incident (o kter\u00e9m u\u017eivatel\u00e9 nemus\u00ed b\u00fdt informov\u00e1ni) nebo ji\u017e o poru\u0161en\u00ed zabezpe\u010den\u00ed osobn\u00edch \u00fadaj\u016f. Za druh\u00e9, v na\u0159\u00edzen\u00ed GDPR je uvedeno n\u011bkolik d\u016fvod\u016f, na jejich\u017e z\u00e1klad\u011b nemus\u00edme u\u017eivatele informovat o tom, \u017ee do\u0161lo k \u00faniku jejich \u00fadaj\u016f. <\/p>\n<p>Mnoho spole\u010dnost\u00ed proto \u010del\u00ed dilematu, co d\u011blat, kdy\u017e jejich \u00fadaje o z\u00e1kazn\u00edc\u00edch spat\u0159\u00ed sv\u011btlo sv\u011bta. Z pohledu spole\u010dnosti The Codest bychom v naprost\u00e9 v\u011bt\u0161in\u011b p\u0159\u00edpad\u016f m\u011bli z\u00e1kazn\u00edky o takov\u00e9 ud\u00e1losti informovat. Pr\u00e1v\u011b o tom je budov\u00e1n\u00ed d\u016fv\u011bry ve zna\u010dku. <\/p>\n<h2>Jak informovat z\u00e1kazn\u00edky o \u00faniku dat?<\/h2>\n<p>Ml\u00e9ko se rozlilo. Stali jsme se ob\u011bt\u00ed \u00faniku dat. Co m\u00e1me d\u011blat d\u00e1l? V prvn\u00ed \u0159ad\u011b bychom m\u011bli m\u00edt p\u0159ipravenou ak\u010dn\u00ed strategii. Ta mus\u00ed na jedn\u00e9 stran\u011b zahrnovat operativn\u00ed opat\u0159en\u00ed, tj. protiopat\u0159en\u00ed k minimalizaci dopad\u016f \u00faniku. Na druh\u00e9 stran\u011b je t\u0159eba udr\u017eovat transparentn\u00ed, pr\u016fb\u011b\u017enou komunikaci se z\u00e1kazn\u00edky o \u00faniku. To v\u00e1m pom\u016f\u017ee zabr\u00e1nit nebo omezit eskalaci potenci\u00e1ln\u00ed krize image a ztr\u00e1tu d\u016fv\u011bry z\u00e1kazn\u00edk\u016f. <\/p>\n<p>Podle dal\u0161\u00edho pr\u016fzkumu, kter\u00fd si nechal zpracovat Chronpesel.pl spole\u010dn\u011b s N\u00e1rodn\u00edm registrem dlu\u017en\u00edk\u016f, lid\u00e9, kte\u0159\u00ed se stali ob\u011bt\u00ed \u00faniku, o\u010dek\u00e1vaj\u00ed, \u017ee budou co nejd\u0159\u00edve informov\u00e1ni o tom, \u017ee do\u0161lo k poru\u0161en\u00ed ochrany osobn\u00edch \u00fadaj\u016f a jak\u00fd je jeho rozsah (p\u0159ibli\u017en\u011b 60 procent odpov\u011bd\u00ed). Krom\u011b toho cht\u011bj\u00ed respondenti informace o tom, co spr\u00e1vce ud\u011blal, aby se podobn\u00fdm situac\u00edm v budoucnu vyhnul (t\u00e9m\u011b\u0159 57 procent), a tak\u00e9 o tom, komu mohly unikl\u00e9 \u00fadaje p\u0159ipadnout (p\u0159es 53 procent).<br \/>\nPosledn\u00ed v\u011bc, kterou chceme, je, aby se dozv\u011bd\u011bli o tom. <strong>\u00faniky dat<\/strong> z m\u00e9di\u00ed nebo antivirov\u00e9ho softwaru. Mus\u00edme jim d\u00e1t \u0161anci, aby se starali a \"chr\u00e1nili\" svou osobnost. <\/p>\n<p>Jak\u00e1 jsou zlat\u00e1 pravidla komunikace v p\u0159\u00edpad\u011b \u00faniku dat? Nejprve o incidentu informujme sv\u00e9 z\u00e1kazn\u00edky. Uka\u017eme, \u017ee situaci m\u00e1me pod kontrolou, \u017ee ji v\u011bdom\u011b zvl\u00e1d\u00e1me. Nast\u00edn\u00edme, co d\u011bl\u00e1me pro minimalizaci negativn\u00edch dopad\u016f \u00faniku. A kone\u010dn\u011b, jak\u00e1 opat\u0159en\u00ed pl\u00e1nujeme zav\u00e9st, abychom podobn\u00e9 situaci v budoucnu zabr\u00e1nili.<\/p>\n<h2>Chra\u0148te data, chra\u0148te z\u00e1kazn\u00edka <\/h2>\n<p>Podle zpr\u00e1vy \"E-commerce v Polsku\", kterou vypracovala spole\u010dnost Gemius, ji\u017e 77 % v\u0161ech u\u017eivatel\u016f internetu nakupuje online. Ka\u017ed\u00fd t\u0159et\u00ed respondent p\u0159izn\u00e1v\u00e1, \u017ee tak nyn\u00ed \u010din\u00ed \u010dast\u011bji ne\u017e p\u0159ed pandemi\u00ed. Podobn\u00e9 procento uv\u00e1d\u00ed, \u017ee po pandemii nakupuj\u00ed v\u00edce produkt\u016f online. Na str\u00e1nk\u00e1ch <strong>e-commerce <a href=\"https:\/\/thecodest.co\/cs\/dictionary\/what-is-the-size-of-your-potential-reachable-market\/\">trh<\/a><\/strong> tak\u00e9 roste extr\u00e9mn\u011b rychl\u00fdm tempem. To se prom\u00edt\u00e1 do v\u011bt\u0161\u00edho po\u010dtu kybernetick\u00fdch \u00fatok\u016f na osobn\u00ed \u00fadaje online u\u017eivatel\u016f. Na to se vyplat\u00ed myslet zejm\u00e9na p\u0159ed V\u00e1noci a pova\u017eovat investici do zabezpe\u010den\u00ed na ochranu u\u017eivatelsk\u00fdch datab\u00e1z\u00ed za nejlep\u0161\u00ed praktick\u00fd v\u00e1no\u010dn\u00ed d\u00e1rek, kter\u00fd m\u016f\u017eeme na\u0161im z\u00e1kazn\u00edk\u016fm d\u00e1t.<\/p>","protected":false},"excerpt":{"rendered":"<p>P\u0159edv\u00e1no\u010dn\u00ed shon je v pln\u00e9m proudu. P\u0159i hled\u00e1n\u00ed d\u00e1rk\u016f pro sv\u00e9 bl\u00edzk\u00e9 jsou lid\u00e9 st\u00e1le \u010dast\u011bji ochotni \"\u0161turmovat\" internetov\u00e9 obchody.<\/p>","protected":false},"author":2,"featured_media":3161,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[16,4,8],"tags":[12],"class_list":["post-3160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-commerce","category-enterprise-scaleups-solutions","category-software-development","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Dilemmas: Data Leaks - The Codest<\/title>\n<meta name=\"description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecodest.co\/cs\/blog\/dilemata-kyberneticke-bezpecnosti-uniky-dat\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Dilemmas: Data Leaks\" \/>\n<meta property=\"og:description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecodest.co\/cs\/blog\/dilemata-kyberneticke-bezpecnosti-uniky-dat\/\" \/>\n<meta property=\"og:site_name\" content=\"The Codest\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T12:48:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T13:03:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"thecodest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecodest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"author\":{\"name\":\"thecodest\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\"},\"headline\":\"Cyber Security Dilemmas: Data Leaks\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"wordCount\":1267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"keywords\":[\"IT\"],\"articleSection\":[\"E-commerce\",\"Enterprise &amp; Scaleups Solutions\",\"Software Development\"],\"inLanguage\":\"cs-CZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"name\":\"Cyber Security Dilemmas: Data Leaks - The Codest\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"description\":\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\"},\"inLanguage\":\"cs-CZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thecodest.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Dilemmas: Data Leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"name\":\"The Codest\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thecodest.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs-CZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\",\"name\":\"The Codest\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"width\":144,\"height\":36,\"caption\":\"The Codest\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/codest\",\"https:\\\/\\\/clutch.co\\\/profile\\\/codest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\",\"name\":\"thecodest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"caption\":\"thecodest\"},\"url\":\"https:\\\/\\\/thecodest.co\\\/cs\\\/author\\\/thecodest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dilemata kybernetick\u00e9 bezpe\u010dnosti: \u00daniky dat - The Codest","description":"Zjist\u011bte, jak mohou spole\u010dnosti p\u0159edch\u00e1zet \u00fanik\u016fm dat a kybernetick\u00fdm \u00fatok\u016fm, chr\u00e1nit informace o z\u00e1kazn\u00edc\u00edch a budovat d\u016fv\u011bru prost\u0159ednictv\u00edm p\u0159\u00edsn\u011bj\u0161\u00edch postup\u016f kybernetick\u00e9 bezpe\u010dnosti.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecodest.co\/cs\/blog\/dilemata-kyberneticke-bezpecnosti-uniky-dat\/","og_locale":"cs_CZ","og_type":"article","og_title":"Cyber Security Dilemmas: Data Leaks","og_description":"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.","og_url":"https:\/\/thecodest.co\/cs\/blog\/dilemata-kyberneticke-bezpecnosti-uniky-dat\/","og_site_name":"The Codest","article_published_time":"2022-12-22T12:48:50+00:00","article_modified_time":"2026-03-09T13:03:06+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","type":"image\/png"}],"author":"thecodest","twitter_card":"summary_large_image","twitter_misc":{"Written by":"thecodest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#article","isPartOf":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"author":{"name":"thecodest","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76"},"headline":"Cyber Security Dilemmas: Data Leaks","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","mainEntityOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"wordCount":1267,"commentCount":0,"publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","keywords":["IT"],"articleSection":["E-commerce","Enterprise &amp; Scaleups Solutions","Software Development"],"inLanguage":"cs-CZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","url":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","name":"Dilemata kybernetick\u00e9 bezpe\u010dnosti: \u00daniky dat - The Codest","isPartOf":{"@id":"https:\/\/thecodest.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","description":"Zjist\u011bte, jak mohou spole\u010dnosti p\u0159edch\u00e1zet \u00fanik\u016fm dat a kybernetick\u00fdm \u00fatok\u016fm, chr\u00e1nit informace o z\u00e1kazn\u00edc\u00edch a budovat d\u016fv\u011bru prost\u0159ednictv\u00edm p\u0159\u00edsn\u011bj\u0161\u00edch postup\u016f kybernetick\u00e9 bezpe\u010dnosti.","breadcrumb":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecodest.co\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Dilemmas: Data Leaks"}]},{"@type":"WebSite","@id":"https:\/\/thecodest.co\/#website","url":"https:\/\/thecodest.co\/","name":"The Codest","description":"","publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecodest.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/thecodest.co\/#organization","name":"The Codest","url":"https:\/\/thecodest.co\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","width":144,"height":36,"caption":"The Codest"},"image":{"@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/codest","https:\/\/clutch.co\/profile\/codest"]},{"@type":"Person","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76","name":"thecodest","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","caption":"thecodest"},"url":"https:\/\/thecodest.co\/cs\/author\/thecodest\/"}]}},"_links":{"self":[{"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/posts\/3160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/comments?post=3160"}],"version-history":[{"count":5,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/posts\/3160\/revisions"}],"predecessor-version":[{"id":7779,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/posts\/3160\/revisions\/7779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/media?parent=3160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/categories?post=3160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecodest.co\/cs\/wp-json\/wp\/v2\/tags?post=3160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}