Cyber Security

A successful approach to cybersecurity has several layers of protection spread across the computers, networks, programs or data one intends to keep safe.
Even ordinary users need to understand basic data security principles, such as choosing strong passwords, protecting attachments in email and backing up data.
The organisation must have a framework for how to deal with both attempted and successful cyberattacks. This framework is a way to identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.
We need efficient tools and techniques so that organisations and individuals can achieve the computer security needed to protect them against cyberattacks.

2020 in Numbers

28% of organisations address IT security findings by outsourcing.
25% year-on-year increase in the number of incidents resolved (NÚKIB).
8,073 cybercrime incidents.
1,267 security incidents solved by CSIRT.CZ.
120 information and communication systems of critical information infrastructure.

Ransomware, DDoS attacks, and Spear-Phishing

Ransomware, DDos attacks and spear-phishing are the three most common forms of attacks in 2020. Ransomware was identified as the most serious attack by nearly a third of respondents from the healthcare sector and 25% of respondents from both the financial and public sectors. Phishing attacks no longer exhibit simple elements that make them easier to identify (bad Czech, different domains).
Do you need to protect your organisation effectively? Or have you even been the target of one of the described types of attacks? We can help you. We offer an audit of the current state of security (with a special focus on the level of security for applications), assessment of compliance with the necessary standards, recommendations and regulations. We can increase the level of security knowledge of your employees, partners and clients. We can participate in securing most areas of cyber security in your organisation.

You do not have your own IT Security Team?

Do you not have your own IT security team? Do you share security competencies among the regular members of your IT department? Do you lack in-depth knowledge and capacity? This is a fairly common situation even at big companies. We can help you in several ways. We can outsource the security competence. We can provide the knowledge and capacity of our specialists on a one-off and ongoing basis or offer artificial intelligence services and sophisticated end-to-end services in the form of Darktrace solutions. We can also help raise security awareness on the part of ordinary users.

CISSP Certification

The CISSP (Certified Information Systems Security Professional) certification is a globally recognised standard in information security certification. It is awarded by the International Information Systems Security Certification Consortium, also known as (ISC)².
The exam assesses proficiency across the eight CBK security domains. Successful completion of the exam demonstrates that you have the advanced knowledge and technical skills to effectively design, implement and manage the best cybersecurity program.
Earning the CISSP proves that you have the skills to effectively design, implement and manage a best-in-class cybersecurity program.
One of 232 holders of this certification nationwide is our long-time employee Peter.


We do not build on greenfield sites. There are numerous recommendations, standards, legal and technical frameworks, in which we have to navigate. The CCA Group is ISO 27001:2013 certified, we have NBÚ clearance to the level of Secret, we actively work with measures defined by the National Office for Cyber and Information Security (NÚKIB). Our security specialists actively monitor developments and trends in this area and ensure that any design or implementation does not conflict with current and known future recommendations and regulations.
2021 © CCA Group
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram