{"id":5639,"date":"2025-11-21T08:37:14","date_gmt":"2025-11-21T08:37:14","guid":{"rendered":"https:\/\/www.balkanservices.com\/blog\/?p=5639"},"modified":"2025-11-21T08:58:00","modified_gmt":"2025-11-21T08:58:00","slug":"cybersecurity-for-businesses-in-bulgaria","status":"publish","type":"post","link":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/","title":{"rendered":"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?<\/h1>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-14c1a38\" data-block-id=\"14c1a38\"><style>.stk-14c1a38 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Almost every second company in Bulgaria has been the target of a cyber incident \u2013 either through falsified invoice data or phishing emails that block systems and cause financial damage. Despite clear signals,<strong> cybersecurity remains underestimated.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-54eac4d\" data-block-id=\"54eac4d\"><style>.stk-54eac4d {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-4decbee is-style-default\" data-v=\"2\" data-block-id=\"4decbee\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-4decbee-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-a0940de\" data-block-id=\"a0940de\"><style>.stk-a0940de .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-a0940de .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-a0940de .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-a0940de .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-a0940de\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-a-0940-de-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-a-0940-de-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-7da236c\" data-block-id=\"7da236c\"><style>.stk-7da236c .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-7da236c .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>The data shows that nearly 50% of companies do not consider cybersecurity a priority, and 81% do not offer training to their employees on the topic. In addition, about 60% of companies do not conduct security tests, which is an alarming sign,&#8220;<\/em> says Veselin Troyanov, general manager of Check Point for Bulgaria, citing data from Check Point Research Cybersecurity: Annual Report for 2025.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-61487df\" data-block-id=\"61487df\"><style>.stk-61487df {height:35px !important;}<\/style><\/div>\n\n\n\n<p>According to the expert, <strong>small and medium-sized enterprises often invest less in security because their focus is on quick returns from digitalization rather than on sustainability and protection<\/strong>. The main reasons are limited resources, a lack of experts, and the perception of cybersecurity as an &#8222;IT issue&#8220; rather than a strategic business risk.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-ba4eea5\" data-block-id=\"ba4eea5\"><style>.stk-ba4eea5 {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-fac686d is-style-default\" data-v=\"2\" data-block-id=\"fac686d\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-fac686d-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-3b8a97d\" data-block-id=\"3b8a97d\"><style>.stk-3b8a97d .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-3b8a97d .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-3b8a97d .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-3b8a97d .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-3b8a97d\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-3-b-8-a-97-d-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-3-b-8-a-97-d-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-ce7a26f\" data-block-id=\"ce7a26f\"><style>.stk-ce7a26f .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-ce7a26f .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>However, we are seeing a gradual change\u2014more and more companies, even small ones, are beginning to realize the need for protection,&#8220;<\/em> Veselin Troyanov adds.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-1a79b3f\" data-block-id=\"1a79b3f\"><style>.stk-1a79b3f {height:35px !important;}<\/style><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The evolution of cyber threats: how AI is becoming a tool for attacks<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-fff1e66\" data-block-id=\"fff1e66\"><style>.stk-fff1e66 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Hackers do not choose targets based on size, but on the ease of profit. Cybercriminals work with business logic \u2013 they look for low costs and high returns.<\/p>\n\n\n\n<p><strong>The main goal of cyberattacks remains the theft of data and information,<\/strong> but artificial intelligence is changing how they are carried out.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-33b95ad\" data-block-id=\"33b95ad\"><style>.stk-33b95ad {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-0af6210 is-style-default\" data-v=\"2\" data-block-id=\"0af6210\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-0af6210-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-510d3a7\" data-block-id=\"510d3a7\"><style>.stk-510d3a7 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-510d3a7 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-510d3a7 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-510d3a7 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-510d3a7\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-510-d-3-a-7-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-510-d-3-a-7-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-1683b96\" data-block-id=\"1683b96\"><style>.stk-1683b96 .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-1683b96 .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>Thanks to <\/em>artificial intelligence<em>, phishing campaigns are becoming more realistic, more widespread, and more difficult to recognize,&#8220;<\/em> adds Veselin Troyanov.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-9c341b3\" data-block-id=\"9c341b3\"><style>.stk-9c341b3 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>He points out that another threat remains the compromise of the AI systems themselves, which are now integrated into almost every business process.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-9ba46b1\" data-block-id=\"9ba46b1\"><style>.stk-9ba46b1 {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-1b39cf3 is-style-default\" data-v=\"2\" data-block-id=\"1b39cf3\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-1b39cf3-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-bda9add\" data-block-id=\"bda9add\"><style>.stk-bda9add .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-bda9add .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-bda9add .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-bda9add .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-bda9add\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-bda-9-add-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-bda-9-add-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-fb51ff7\" data-block-id=\"fb51ff7\"><style>.stk-fb51ff7 .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-fb51ff7 .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\">That&#8217;s why organizations need to think not only about protecting themselves from AI-based attacks, but also about protecting their own AI solutions,&#8220; says Veselin Troyanov.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-caa2f7d\" data-block-id=\"caa2f7d\"><style>.stk-caa2f7d {height:35px !important;}<\/style><\/div>\n\n\n\n<p>And while regulations in Europe are clear\u2014the GDPR defines what is legal when using artificial intelligence, especially when it comes to personal data, images, and information about identifiable individuals \u2014and violations are quickly sanctioned, this is not the case in the US, where thousands of AI-related lawsuits are pending.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-dea4c74\" data-block-id=\"dea4c74\"><style>.stk-dea4c74 {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-11c864b is-style-default\" data-v=\"2\" data-block-id=\"11c864b\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-11c864b-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-64c6964\" data-block-id=\"64c6964\"><style>.stk-64c6964 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-64c6964 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-64c6964 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-64c6964 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-64c6964\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-64-c-6964-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-64-c-6964-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f60a51c\" data-block-id=\"f60a51c\"><style>.stk-f60a51c .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-f60a51c .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>Many people upload entire databases to artificial intelligence platforms, including the paid version of ChatGPT \u2013 confidential files with sales, delivery prices, pricing policies \u2013 and want AI to analyze them,&#8220;<\/em> says Radoslav Yordanov, IT Account Manager at Balkan Services. <\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-a1baa4a\" data-block-id=\"a1baa4a\"><style>.stk-a1baa4a {height:35px !important;}<\/style><\/div>\n\n\n\n<p>He emphasises that the legality of such practices is debatable. Still, it is undoubtedly a bad practice, as <strong>every bit of information uploaded to an AI platform is used to train the model.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-bbef9c2\" data-block-id=\"bbef9c2\"><style>.stk-bbef9c2 {height:35px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-ba10950\" data-block-id=\"ba10950\"><style>.stk-ba10950 {height:35px !important;}<\/style><\/div>\n\n\n<div data-block=\"hook:3908\" class=\"alignfull\" data-block-structure=\"custom\"><div class=\"ct-container-full\" data-content=\"normal\"><article id=\"post-3908\" class=\"post-3908\"><div class=\"entry-content is-layout-constrained\">\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-center is-image-fill is-style-default has-palette-color-8-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-326cc7970ec94e154d90381fd2939023\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50);margin-left:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;grid-template-columns:auto 37%\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" style=\"margin-top:var(--wp--preset--spacing--40);margin-right:0;margin-bottom:0;margin-left:0\">Looking for business software?<\/h2>\n\n\n\n<p class=\"has-palette-color-8-color has-text-color\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20);font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.234), 17px);line-height:1.5\">Our team is here to listen carefully and offer the right solution for you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-088e0d7\" data-block-id=\"088e0d7\"><style>.stk-088e0d7{margin-bottom:30px !important;position:relative !important}@media screen and (max-width:999px){.stk-088e0d7{margin-bottom:36px !important}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button is-style-ghost stk-block stk-cb9bee0\" data-block-id=\"cb9bee0\"><style>.stk-cb9bee0{top:23px !important}.stk-cb9bee0 .stk-button{padding-right:33px !important;padding-left:33px !important;background:var(--theme-palette-color-1,#F6891F) !important}.stk-cb9bee0 .stk-button:hover:after{background:transparent !important;opacity:1 !important}:where(.stk-hover-parent:hover,.stk-hover-parent.stk--is-hovered) .stk-cb9bee0 .stk-button:after{background:transparent !important;opacity:1 !important}.stk-cb9bee0 .stk-button:before{border-style:solid !important;border-color:var(--theme-palette-color-8,#ffffff) !important;border-top-width:0px !important;border-right-width:0px !important;border-bottom-width:0px !important;border-left-width:0px !important}.stk-cb9bee0 .stk-button__inner-text{color:var(--theme-palette-color-8,#ffffff) !important}<\/style><a class=\"stk-link stk-button stk--hover-effect-lift\" href=\"https:\/\/www.balkanservices.com\/eng\/contact\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-text-color stk-button__inner-text\">Schedule a free consultation &gt;<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg);background-position:50% 50%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"638\" src=\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg\" alt=\"\" class=\"wp-image-3887 size-full\" srcset=\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg 1024w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-300x187.jpg 300w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-768x478.jpg 768w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1536x957.jpg 1536w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-2048x1276.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n<\/div><\/article><\/div><\/div>\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-ce47094\" data-block-id=\"ce47094\"><style>.stk-ce47094 {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-fa7cb0d is-style-default\" data-v=\"2\" data-block-id=\"fa7cb0d\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-fa7cb0d-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-c7cb440\" data-block-id=\"c7cb440\"><style>.stk-c7cb440 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-c7cb440 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-c7cb440 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-c7cb440 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-c7cb440\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-c-7-cb-440-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-c-7-cb-440-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-2788c46\" data-block-id=\"2788c46\"><style>.stk-2788c46 .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-2788c46 .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>&#8222;This means that if another user asks the model for an example, it can use the uploaded know-how and even quote numbers or data from the uploaded corporate database. This can reveal trade secrets, pricing policies, or internal information,&#8220;<\/em> the expert explained.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-eeeceae\" data-block-id=\"eeeceae\"><style>.stk-eeeceae {height:35px !important;}<\/style><\/div>\n\n\n\n<p>According to Radoslav Yordanov, such cases can be resolved by introducing clear internal policies for accessing and working with documentation\u2014for example, <strong>a technical ban on uploading files to AI platforms.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-4812604\" data-block-id=\"4812604\"><style>.stk-4812604 {height:35px !important;}<\/style><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The weakest link \u2013 email and employees<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-180ce2a\" data-block-id=\"180ce2a\"><style>.stk-180ce2a {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Against the backdrop of the exponential growth of AI platforms, email remains the most common vector for attacks. Phishing campaigns are becoming increasingly sophisticated and personalised thanks to improved social engineering and automation techniques. In most cases, human error is at the root of successful attacks.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-d42a975\" data-block-id=\"d42a975\"><style>.stk-d42a975 {height:35px !important;}<\/style><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><a href=\"https:\/\/www.balkanservices.com\/blog\/en\/nis-2-what-does-bulgarian-business-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">NIS 2: What does Bulgarian business need to know?<br><\/a><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-04fe01e\" data-block-id=\"04fe01e\"><style>.stk-04fe01e {height:35px !important;}<\/style><\/div>\n\n\n\n<p><strong>Employees have always been, and will remain, the weakest link in the cybersecurity chain<\/strong>. Thanks to regulations such as NIS2, more and more organisations are required to pay attention to staff training and awareness.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-381d47f\" data-block-id=\"381d47f\"><style>.stk-381d47f {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-86e783e is-style-default\" data-v=\"2\" data-block-id=\"86e783e\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-86e783e-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-4055561\" data-block-id=\"4055561\"><style>.stk-4055561 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-4055561 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-4055561 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-4055561 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-4055561\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-4055561-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-4055561-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-8d8d6d5\" data-block-id=\"8d8d6d5\"><style>.stk-8d8d6d5 .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-8d8d6d5 .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>The results of phishing simulations are often alarming\u2014in some companies, over 90% of employees click on fake links. This clearly demonstrates the need for ongoing training, practical testing, and building a culture of cybersecurity at all levels of the organisation,&#8220;<\/em> notes Veselin Troyanov.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-231f012\" data-block-id=\"231f012\"><style>.stk-231f012 {height:35px !important;}<\/style><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How can companies limit the risk of cyber incidents caused by human error?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-ed82d93\" data-block-id=\"ed82d93\"><style>.stk-ed82d93 {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-fb36f08 is-style-default\" data-v=\"2\" data-block-id=\"fb36f08\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-fb36f08-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-d3ecba1\" data-block-id=\"d3ecba1\"><style>.stk-d3ecba1 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-d3ecba1 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-d3ecba1 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-d3ecba1 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-d3ecba1\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-d-3-ecba-1-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-d-3-ecba-1-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f0ac1c7\" data-block-id=\"f0ac1c7\"><style>.stk-f0ac1c7 .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-f0ac1c7 .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>For small and medium-sized businesses, it is critical that work computers operate in a domain environment\u2014a closed internal network managed through a centralised tool. This allows for centralised access rights and policies,&#8220;<\/em> explains Radoslav Yordanov.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-fb2b09b\" data-block-id=\"fb2b09b\"><style>.stk-fb2b09b {height:35px !important;}<\/style><\/div>\n\n\n\n<p>He gives an example of a best practice approach to work, according to which: <em>&#8222;Employees are not administrators of their devices. They cannot install software, change system files, or perform other risky actions. Policies are automatically distributed through a centralised tool, and user behaviour can be monitored and controlled through the antivirus system console.&#8220;<\/em><\/p>\n\n\n\n<p><br>In other words, <strong>there are practical tools that protect users from their own mistakes.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-6155c17\" data-block-id=\"6155c17\"><style>.stk-6155c17 {height:35px !important;}<\/style><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Where does <a href=\"https:\/\/www.balkanservices.com\/eng\/services\/information-security\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a> begin in any company?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-6d067cb\" data-block-id=\"6d067cb\"><style>.stk-6d067cb {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Proper cybersecurity begins before implementing protective technologies. Most companies reduce the concept of &#8222;IT security&#8220; to computer viruses, but <strong>the real threats today are related to identity theft<\/strong>. This includes not only personal data, but also credit card data \u2014 whether personal or corporate.<\/p>\n\n\n\n<p>Therefore, the first step is to assess existing, potential, and unrecognised risks.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-5408dbb\" data-block-id=\"5408dbb\"><style>.stk-5408dbb {height:35px !important;}<\/style><\/div>\n\n\n\n<blockquote class=\"wp-block-stackable-blockquote stk-block-blockquote stk-block stk-6d3f982 is-style-default\" data-v=\"2\" data-block-id=\"6d3f982\"><div class=\"has-text-align-left stk-block-blockquote__content stk-container stk-6d3f982-container stk-hover-parent\"><div class=\"stk-block-content stk-inner-blocks\">\n<div class=\"wp-block-stackable-icon stk-block-icon has-text-align-left stk-block stk-e37ec87\" data-block-id=\"e37ec87\"><style>.stk-e37ec87 .stk--svg-wrapper .stk--inner-svg svg:last-child{height:50px !important;width:50px !important;opacity:0.6 !important;}.stk-e37ec87 .stk--svg-wrapper .stk--inner-svg svg:last-child, .stk-e37ec87 .stk--svg-wrapper .stk--inner-svg svg:last-child :is(g, path, rect, polygon, ellipse){fill:var(--theme-palette-color-1, #F6891F) !important;}.stk-e37ec87 .stk--svg-wrapper .stk--inner-svg{border-radius:64% !important;}<\/style><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg style=\"height:0;width:0\"><defs><linearGradient id=\"linear-gradient-e37ec87\" x1=\"0\" x2=\"100%\" y1=\"0\" y2=\"0\"><stop offset=\"0%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-e-37-ec-87-color-1)\"><\/stop><stop offset=\"100%\" style=\"stop-opacity:1;stop-color:var(--linear-gradient-e-37-ec-87-color-2)\"><\/stop><\/linearGradient><\/defs><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 50 50\" aria-hidden=\"true\" width=\"32\" height=\"32\"><path d=\"M9.4 14.6c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.3.9 7.3 2.7 2 1.8 3 4.2 3 7.3 0 1.9-.5 3.6-1.4 5.1-.9 1.5-2.2 2.7-3.8 3.6s-3.3 1.3-5.1 1.3c-4.1 0-7.3-1.6-9.5-4.9C.9 36.9 0 33.5 0 29.4c0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.3 1.3-6.2 3.5-8.7 6.4zm27.5 0c-2.4 2.9-3.6 5.9-3.6 8.9 0 1.3.2 2.4.5 3.3 1.8-1.4 3.8-2.1 6-2.1 2.9 0 5.4.9 7.4 2.7 2 1.8 3 4.2 3 7.3 0 2.8-1 5.2-3 7.1-2 1.9-4.4 2.9-7.3 2.9-4.1 0-7.3-1.6-9.5-4.9-1.8-2.7-2.8-6.2-2.8-10.3 0-5.2 1.4-9.9 4.1-14 2.8-4.1 6.9-7.5 12.5-10l1.5 2.8c-3.5 1.2-6.4 3.4-8.8 6.3z\"><\/path><\/svg><\/div><\/span><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-d6e4dca\" data-block-id=\"d6e4dca\"><style>.stk-d6e4dca .stk-block-text__text{font-size:20px !important;}@media screen and (max-width:999px){.stk-d6e4dca .stk-block-text__text{font-size:20px !important;}}<\/style><p class=\"stk-block-text__text\"><em>When a client comes to us for<a href=\"https:\/\/www.balkanservices.com\/eng\/services\/information-security\" target=\"_blank\" rel=\"noreferrer noopener\"> IT support and cybersecurity<\/a>, we start with the most important step\u2014a detailed analysis of the current IT infrastructure. We assess whether risks already exist and to what extent the organisation is aware of them\u2014in many cases, companies are unaware of the vulnerabilities they face.<\/em><br><em>That&#8217;s why our team conducts a full IT audit, including antivirus protection, network security, the domain environment, and access control systems.<\/em><br><em>This is the foundation on which any effective cybersecurity strategy is based,&#8220;<\/em> says Radoslav Yordanov.<\/p><\/div>\n<\/div><\/div><\/blockquote>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-e33120c\" data-block-id=\"e33120c\"><style>.stk-e33120c {height:35px !important;}<\/style><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.balkanservices.com\/eng\/services\" target=\"_blank\" rel=\"noreferrer noopener\">Balkan Services&#8217; IT services<\/a><\/h2>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-add4db7\" data-block-id=\"add4db7\"><style>.stk-add4db7 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Today, Balkan Services provides a comprehensive IT audit focused on information cybersecurity, designed to give complete protection to the organisation. The audit covers the entire spectrum\u2014from assessing current security systems and implementing stricter policies to recommending upgrades or implementing new security solutions where necessary. The scope includes expertise and checks for the development and management of a centralised tool, network segmentation, backup systems, multi-factor authentication, centralised antivirus and XDR solutions with DLP, Next Generation Firewall, SIEM system, mobile device management, and more.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-1ee8395\" data-block-id=\"1ee8395\"><style>.stk-1ee8395 {height:35px !important;}<\/style><\/div>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><a href=\"https:\/\/www.balkanservices.com\/blog\/en\/how-to-calculate-the-return-on-investment-in-an-erp-system-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to calculate the return on investment in an ERP software? (part 1)<br><\/a><br><\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-9ab7115\" data-block-id=\"9ab7115\"><style>.stk-9ab7115 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>At Balkan Services, each cybersecurity solution is developed individually\u2014not based on industry standards, but on the organisation&#8217;s real needs. When building protection, the team considers the number of employees, the specifics of the IT infrastructure, and the risks that need to be addressed or prevented.<\/p>\n\n\n\n<p>That is why no two projects are the same \u2013 just as there is no universal protection. Balkan Services builds solutions tailored to each environment to ensure the most effective level of security for every business.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-5809bcc\" data-block-id=\"5809bcc\"><style>.stk-5809bcc {height:35px !important;}<\/style><\/div>\n\n\n<div data-block=\"hook:3908\" class=\"alignfull\" data-block-structure=\"custom\"><div class=\"ct-container-full\" data-content=\"normal\"><article id=\"post-3908\" class=\"post-3908\"><div class=\"entry-content is-layout-constrained\">\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-center is-image-fill is-style-default has-palette-color-8-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-326cc7970ec94e154d90381fd2939023\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50);margin-left:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;grid-template-columns:auto 37%\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" style=\"margin-top:var(--wp--preset--spacing--40);margin-right:0;margin-bottom:0;margin-left:0\">Looking for business software?<\/h2>\n\n\n\n<p class=\"has-palette-color-8-color has-text-color\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--20);font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.234), 17px);line-height:1.5\">Our team is here to listen carefully and offer the right solution for you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-b4jh3lk\" data-block-id=\"b4jh3lk\"><style>.stk-b4jh3lk{margin-bottom:30px !important;position:relative !important}@media screen and (max-width:999px){.stk-b4jh3lk{margin-bottom:36px !important}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button is-style-ghost stk-block stk-t7j8sde\" data-block-id=\"t7j8sde\"><style>.stk-t7j8sde{top:23px !important}.stk-t7j8sde .stk-button{padding-right:33px !important;padding-left:33px !important;background:var(--theme-palette-color-1,#F6891F) !important}.stk-t7j8sde .stk-button:hover:after{background:transparent !important;opacity:1 !important}:where(.stk-hover-parent:hover,.stk-hover-parent.stk--is-hovered) .stk-t7j8sde .stk-button:after{background:transparent !important;opacity:1 !important}.stk-t7j8sde .stk-button:before{border-style:solid !important;border-color:var(--theme-palette-color-8,#ffffff) !important;border-top-width:0px !important;border-right-width:0px !important;border-bottom-width:0px !important;border-left-width:0px !important}.stk-t7j8sde .stk-button__inner-text{color:var(--theme-palette-color-8,#ffffff) !important}<\/style><a class=\"stk-link stk-button stk--hover-effect-lift\" href=\"https:\/\/www.balkanservices.com\/eng\/contact\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-text-color stk-button__inner-text\">Schedule a free consultation &gt;<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg);background-position:50% 50%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"638\" src=\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg\" alt=\"\" class=\"wp-image-3887 size-full\" srcset=\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1024x638.jpg 1024w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-300x187.jpg 300w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-768x478.jpg 768w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-1536x957.jpg 1536w, https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/01\/BOO2528-2048x1276.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n<\/div><\/article><\/div><\/div>\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-853e475\" data-block-id=\"853e475\"><style>.stk-853e475 {height:35px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-divider alignwide stk-block-divider stk-block stk-cf00ff1\" data-block-id=\"cf00ff1\"><hr class=\"stk-block-divider__hr\"\/><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-6463044\" data-block-id=\"6463044\"><style>.stk-6463044 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Nowadays, no business can grow and be competitive without using IT systems. Choosing the right software solution and implementing it is a complex, difficult, but critically important decision.<\/p>\n\n\n\n<p>At Balkan Services, we have expert knowledge of business, technology, and legislation, and we are fluent in all three languages. We will listen to you carefully and advise you on choosing the right business system for your needs.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-2192789\" data-block-id=\"2192789\"><style>.stk-2192789 {height:35px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.balkanservices.com\/eng\/contact\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us &gt;<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-198d1b0\" data-block-id=\"198d1b0\"><style>.stk-198d1b0 {height:35px !important;}<\/style><\/div>\n\n\n\n<p>Balkan Services has been supporting businesses on their path to digital transformation since 2006. We have already helped over 270 companies digitize their business by implementing proven software solutions and managing their IT infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error? Almost every second company in Bulgaria has been the target of a cyber incident \u2013 either through falsified invoice data or phishing emails that block systems and cause financial damage. Despite clear signals, cybersecurity remains underestimated. The data shows [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[333],"tags":[],"class_list":["post-5639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity for businesses in Bulgaria<\/title>\n<meta name=\"description\" content=\"How can you protect your company from attacks and human error? Read the experts&#039; advice in our new blog article &gt;&gt;&gt;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\" \/>\n<meta property=\"og:locale\" content=\"bg_BG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for businesses in Bulgaria\" \/>\n<meta property=\"og:description\" content=\"How can you protect your company from attacks and human error? Read the experts&#039; advice in our new blog article &gt;&gt;&gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-21T08:37:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T08:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Balkan Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Balkan Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u043c\u0438\u043d\u0443\u0442\u0438\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\"},\"author\":{\"name\":\"Balkan Services\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#\/schema\/person\/f192577ba6ea479a9edcdc85561d15a3\"},\"headline\":\"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?\",\"datePublished\":\"2025-11-21T08:37:14+00:00\",\"dateModified\":\"2025-11-21T08:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\"},\"wordCount\":1222,\"publisher\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg\",\"articleSection\":[\"IT\"],\"inLanguage\":\"bg-BG\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\",\"url\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\",\"name\":\"Cybersecurity for businesses in Bulgaria\",\"isPartOf\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg\",\"datePublished\":\"2025-11-21T08:37:14+00:00\",\"dateModified\":\"2025-11-21T08:58:00+00:00\",\"description\":\"How can you protect your company from attacks and human error? Read the experts' advice in our new blog article >>>\",\"breadcrumb\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#breadcrumb\"},\"inLanguage\":\"bg-BG\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"bg-BG\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage\",\"url\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg\",\"contentUrl\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg\",\"width\":1200,\"height\":900,\"caption\":\"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041d\u0430\u0447\u0430\u043b\u043e\",\"item\":\"https:\/\/www.balkanservices.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#website\",\"url\":\"https:\/\/www.balkanservices.com\/blog\/\",\"name\":\"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.balkanservices.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"bg-BG\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#organization\",\"name\":\"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services\",\"url\":\"https:\/\/www.balkanservices.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bg-BG\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/05\/BS-square.svg\",\"contentUrl\":\"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/05\/BS-square.svg\",\"width\":64,\"height\":64,\"caption\":\"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services\"},\"image\":{\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.balkanservices.com\/blog\/#\/schema\/person\/f192577ba6ea479a9edcdc85561d15a3\",\"name\":\"Balkan Services\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bg-BG\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g\",\"caption\":\"Balkan Services\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for businesses in Bulgaria","description":"How can you protect your company from attacks and human error? Read the experts' advice in our new blog article >>>","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/","og_locale":"bg_BG","og_type":"article","og_title":"Cybersecurity for businesses in Bulgaria","og_description":"How can you protect your company from attacks and human error? Read the experts' advice in our new blog article >>>","og_url":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/","og_site_name":"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services","article_published_time":"2025-11-21T08:37:14+00:00","article_modified_time":"2025-11-21T08:58:00+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg","type":"image\/jpeg"}],"author":"Balkan Services","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Balkan Services","Est. reading time":"5 \u043c\u0438\u043d\u0443\u0442\u0438"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#article","isPartOf":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/"},"author":{"name":"Balkan Services","@id":"https:\/\/www.balkanservices.com\/blog\/#\/schema\/person\/f192577ba6ea479a9edcdc85561d15a3"},"headline":"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?","datePublished":"2025-11-21T08:37:14+00:00","dateModified":"2025-11-21T08:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/"},"wordCount":1222,"publisher":{"@id":"https:\/\/www.balkanservices.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg","articleSection":["IT"],"inLanguage":"bg-BG"},{"@type":"WebPage","@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/","url":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/","name":"Cybersecurity for businesses in Bulgaria","isPartOf":{"@id":"https:\/\/www.balkanservices.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage"},"image":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage"},"thumbnailUrl":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg","datePublished":"2025-11-21T08:37:14+00:00","dateModified":"2025-11-21T08:58:00+00:00","description":"How can you protect your company from attacks and human error? Read the experts' advice in our new blog article >>>","breadcrumb":{"@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#breadcrumb"},"inLanguage":"bg-BG","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/"]}]},{"@type":"ImageObject","inLanguage":"bg-BG","@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#primaryimage","url":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg","contentUrl":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2025\/11\/CyberSecurity_Blog_1200x900px.jpg","width":1200,"height":900,"caption":"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.balkanservices.com\/blog\/en\/cybersecurity-for-businesses-in-bulgaria\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041d\u0430\u0447\u0430\u043b\u043e","item":"https:\/\/www.balkanservices.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for businesses in Bulgaria: How can we protect our companies from attacks and human error?"}]},{"@type":"WebSite","@id":"https:\/\/www.balkanservices.com\/blog\/#website","url":"https:\/\/www.balkanservices.com\/blog\/","name":"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services","description":"","publisher":{"@id":"https:\/\/www.balkanservices.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.balkanservices.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"bg-BG"},{"@type":"Organization","@id":"https:\/\/www.balkanservices.com\/blog\/#organization","name":"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services","url":"https:\/\/www.balkanservices.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"bg-BG","@id":"https:\/\/www.balkanservices.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/05\/BS-square.svg","contentUrl":"https:\/\/www.balkanservices.com\/blog\/wp-content\/uploads\/2024\/05\/BS-square.svg","width":64,"height":64,"caption":"\u0411\u043b\u043e\u0433\u044a\u0442 \u0437\u0430 \u0434\u0438\u0433\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u043d\u0430 Balkan Services"},"image":{"@id":"https:\/\/www.balkanservices.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.balkanservices.com\/blog\/#\/schema\/person\/f192577ba6ea479a9edcdc85561d15a3","name":"Balkan Services","image":{"@type":"ImageObject","inLanguage":"bg-BG","@id":"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/edaac1624b8eeed81cb8ba9d9ce7361c25d6ab34bd767a94001ea4d2fbade4ad?s=96&d=mm&r=g","caption":"Balkan Services"}}]}},"lang":"en","translations":{"en":5639,"bg":5624},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/posts\/5639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/comments?post=5639"}],"version-history":[{"count":5,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/posts\/5639\/revisions"}],"predecessor-version":[{"id":5645,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/posts\/5639\/revisions\/5645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/media\/5640"}],"wp:attachment":[{"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/media?parent=5639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/categories?post=5639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.balkanservices.com\/blog\/wp-json\/wp\/v2\/tags?post=5639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}