Therefore, you must be aware that, as the operator of the key service, we make every effort to ensure the continuity of the key service in accordance with the requirements of the Act of 5 July 2018 on the national cybersecurity system (Journal of Laws of 2018, item 1560).

Cybersecurity, understood in accordance with the Act in force as “resistance of information systems to activities violating the confidentiality, integrity, availability and authenticity of the processed data or related services offered by these systems” is a very important and demanding issue in modern times.

Along with the development of security systems, the number and level of complexity of threats increases, and there are more and more attacks by hackers (cyberterrorism) who use new malware and scripts developed by themselves or others, the purpose of which is to get unauthorised access to accounts and files of other users, and thus to steal business information and take control over processes.
These are risks that can lead to serious business losses.
Good preparation to resist cyber attacks guarantees companies a greater competitive advantage, and may even determine their survival.

The effectiveness of activities undertaken within its framework requires and strictly depends on effective and reasonable cooperation between government institutions and private enterprises, based, inter alia, on joint and reliable exchange of information and joint activities aimed at the elimination of incidents, understood as “an event that has or could have an adverse effect on cybersecurity”, which is one of the foundations of the National Cybersecurity System.

If you notice anything disturbing that is related to cybercrime, please inform the relevant services about it:

Reporting security incidents on the Internet

Receiving reports of illegal content on the Internet

In view of the above, bearing in mind, inter alia, the provisions of the aforementioned Act on the national cybersecurity system and the extremely important recommendation to spread information on cybersecurity and access to knowledge, we encourage you to read the content available at the following links: