{"id":12,"date":"2024-10-03T11:07:40","date_gmt":"2024-10-03T09:07:40","guid":{"rendered":"https:\/\/beamup.me\/?page_id=12"},"modified":"2024-10-09T08:09:43","modified_gmt":"2024-10-09T06:09:43","slug":"beamup-home","status":"publish","type":"page","link":"https:\/\/beamup.me\/en\/","title":{"rendered":"BeamUp Home"},"content":{"rendered":"<section class=\"vc_section_wrapper has_bg_img\"><div class=\"bg-layer\" style=\"background-image: url(https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/2-front-cover.jpg?id=212) ;background-position: center ;background-repeat: no-repeat ;background-size: cover ;\" data-inertia=\"0.2\" ><\/div><div class=\"wpb_row  vc_custom_1728124959708 row-fluid\"style=\"background: none !important; background-image: none !important; background-color: inherit !important;padding-top: 500px ;\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/section><section class=\"vc_section_wrapper\"><div class=\"wpb_row  row-fluid\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"headline-box\"><div class=\"separator-large\"><\/div><h1 class=\"headline\" style=\"text-align:Center\"><em><b>Teleport threats out of your digital systems<\/b><\/em><\/h1><div class=\"separator-large\"><\/div><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><strong>Cybersecurity: Because your data is not a game of chance<\/strong><\/h4>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Dear (future) business partners,<\/p>\n<p>We all know that the Internet is like the Wild West: it is full of unknown heroes and dangerous traps. But instead of battling bandits in a saloon, we have to deal with hackers and cyber threats lurking on the other side of the screen.<\/p>\n<p><strong>Why is cyber security critical for your business?<\/strong><\/p>\n<p>Imagine this: your organization is like a fortress. Inside are valuable data, your business secrets, and most importantly \u2013 your clients. But out there, in the darkness of the internet, there are hackers waiting for the right moment to come in and wreak havoc. And while you are sitting at your desk, they are smiling, planning their attack.<\/p>\n<p><strong>Why is your role the most important?<\/strong><\/p>\n<p>Just as a captain steers a ship, you as a company leader must take responsibility for cyber security. Get involved in the process and work alongside our team to ensure all aspects of your organization are protected.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li class=\"translation-block\"><strong>Culture of safety<\/strong>: As culture is implied in business, the culture of safety must also be present. If your employees see that security is considered important, they will be motivated to follow the protocol.<\/li>\n<li class=\"translation-block\"><strong>Resource Support<\/strong>: Investing in cyber security is like investing in the latest technology \u2013 it will help you stay competitive and secure.<\/li>\n<li class=\"translation-block\"><strong>Risk Reduction<\/strong>: With the right approach, you will reduce the risk of cyber attacks and potential losses.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><strong>When it comes to your data, there is no room for improvisation!<\/strong><\/h4>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"vc_section_wrapper has_bg_color\"><div class=\"bg-layer\" style=\"background-color: #3f3f3f ;\" data-inertia=\"0.2\" ><\/div><div class=\"wpb_row  vc_custom_1727948475536 row-fluid\"style=\"background: none !important; background-image: none !important; background-color: inherit !important;\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"headline-box\"><div class=\"separator-large\"><\/div><h1 class=\"headline\" style=\"text-align:Center\"><em><b>How do we teleport clients out of vulnerable situations, providing them with a safe digital environment?<\/b><\/em><\/h1><div class=\"separator-large\"><\/div><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"vc_section_wrapper has_bg_color\"><div class=\"bg-layer\" style=\"background-color: #3f3f3f ;\" data-inertia=\"0.2\" ><\/div><div class=\"wpb_row  vc_custom_1727948475536 row-fluid\"style=\"background: none !important; background-image: none !important; background-color: inherit !important;\" ><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"680\" src=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-1.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"0-how-glad\" srcset=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-1.png 680w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-1-300x300.png 300w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-1-150x150.png 150w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"headline-subtitle\"><h1 class=\"headline\">Data Guard Knight<\/h1><h2 class=\"subtitle\">Armor for your confidential information!<\/h2><div class=\"separator-subtitle\"><\/div><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">Osim same za\u0161tite, poma\u017eemo vam i u uspostavi preventivnih mjera kako biste sprije\u010dili budu\u0107e online napade na va\u0161e baze podataka.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_double vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vc_btn3-container vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-block vc_btn3-color-success\" href=\"https:\/\/beamup.me\/en\/nase-usluge\/#dataguardknight\" title=\"\">Learn more<\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"680\" src=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-phish.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"0-how-phish\" srcset=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-phish.png 680w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-phish-300x300.png 300w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-phish-150x150.png 150w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"headline-subtitle\"><h1 class=\"headline\">Phish &amp; Chips<\/h1><h2 class=\"subtitle\">Who Fell for the Trick?<\/h2><div class=\"separator-subtitle\"><\/div><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">The service includes personalized phishing scenarios tailored to your business, ensuring a realistic experience for your employees.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_double vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vc_btn3-container vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-block vc_btn3-color-success\" href=\"https:\/\/beamup.me\/en\/nase-usluge\/#phishchips\" title=\"\">Learn more<\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div  class=\"wpb_single_image wpb_content_element vc_align_left\">\n\t\t\n\t\t<figure class=\"wpb_wrapper vc_figure\">\n\t\t\t<div class=\"vc_single_image-wrapper   vc_box_border_grey\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"680\" src=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-2.png\" class=\"vc_single_image-img attachment-full\" alt=\"\" title=\"0-how-glad\" srcset=\"https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-2.png 680w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-2-300x300.png 300w, https:\/\/beamup.me\/wp-content\/uploads\/2024\/10\/0-how-glad-2-150x150.png 150w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/div>\n\t\t<\/figure>\n\t<\/div>\n<div class=\"headline-subtitle\"><h1 class=\"headline\">Network Gladiator<\/h1><h2 class=\"subtitle\">We defend the signal, we attack vulnerabilities!<\/h2><div class=\"separator-subtitle\"><\/div><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"color: #ffffff;\">We perform advanced penetration tests on your network to simulate real attacks and detect all possible weaknesses in the network system.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_double vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vc_btn3-container vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-block vc_btn3-color-success\" href=\"https:\/\/beamup.me\/en\/nase-usluge\/#networkgladiators\" title=\"\">Learn more<\/a><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"vc_section_wrapper\"><div class=\"wpb_row  row-fluid\" ><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Investing in your cyber security<\/strong><\/p>\n<p>At the end of the day, cybersecurity isn't just about protecting against threats\u2014it's also an investment in your company's future. We're here to make sure your data is safe, your employees are educated, and your network is protected.<\/p>\n<p>Ne \u010dekajte da vas hakeri iznenade! Kada su u pitanju va\u0161i podaci, nikad nije previ\u0161e osiguranja.<\/p>\n<p>S nama, va\u0161a digitalna tvr\u0111ava \u0107e biti tako sigurna da \u0107e se zlonamjerni korisnici odlu\u010diti za manje izazovnu &#8220;lovinu&#8221;.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><div class=\"vc_btn3-container vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-block vc_btn3-color-success\" href=\"https:\/\/beamup.me\/en\/kontakt\/\" title=\"CONTACT\">CONTACT US FOR AN OFFER<\/a><\/div><div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><\/section>","protected":false},"excerpt":{"rendered":"Teleportirajte prijetnje iz svojih digitalnih sustava Kiberneti\u010dka sigurnost: Jer Va\u0161i podaci nisu igre na sre\u0107u Dragi (budu\u0107i) poslovni partneri, Svi znamo da je internet poput Divljeg zapada: pun je nepoznatih junaka i opasnih zamki. Ali umjesto da se borimo s banditima u saloonu, moramo se suo\u010diti s hakerima i kiberneti\u010dkim prijetnjama koji vrebaju s druge strane ekrana. Za\u0161to je kiberneti\u010dka sigurnost klju\u010dna za va\u0161u firmu? Zamislite ovo: va\u0161a organizacija je kao tvr\u0111ava. Unutra su vrijedni podaci, va\u0161e poslovne tajne, i \u0161to je najva\u017enije \u2013 va\u0161i klijenti. Ali vani, u tami interneta, kriju se hakeri koji \u010dekaju pravi trenutak da u\u0111u i naprave nered. I dok vi sjedite za svojim radnim stolom, oni se smje\u0161kaju, planiraju\u0107i napad. Za\u0161to je va\u0161a uloga najbitnija? Kao \u0161to kapetan vodi brod, tako i vi kao vo\u0111a tvrtke morate preuzeti odgovornost za kiberneti\u010dku sigurnost. Uklju\u010dite se u proces i radite zajedno s na\u0161im timom kako biste osigurali da su svi aspekti va\u0161e organizacije za\u0161ti\u0107eni. Kultura sigurnosti: Kao \u0161to se kultura podrazumijeva u poslovanju, tako i kultura sigurnosti mora biti prisutna. Ako va\u0161i zaposlenici vide da se sigurnost smatra va\u017enom, bit \u0107e motivirani da se pridr\u017eavaju protokola. Podr\u0161ka resursima: Ulaganje u cyber sigurnost je kao ulaganje u najnoviju tehnologiju \u2013 to \u0107e vam pomo\u0107i da ostanete konkurentni i sigurni. Smanjenje rizika: S pravim pristupom, smanjit \u0107ete rizik od cyber napada i potencijalnih gubitaka. Kada\u00a0 su Va\u0161i podaci u pitanju, nema mjesta za improvizaciju! Kako teleportiramo klijente iz ranjivih situacija, osiguravaju\u0107i im sigurno digitalno okru\u017eenje? Data Guard KnightOklop [...]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":65,"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/pages\/12\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/beamup.me\/en\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}