{"id":25887,"date":"2021-10-29T16:36:35","date_gmt":"2021-10-29T13:36:35","guid":{"rendered":"https:\/\/cypro.bg\/?page_id=25887"},"modified":"2023-09-27T15:17:13","modified_gmt":"2023-09-27T12:17:13","slug":"it-audit","status":"publish","type":"page","link":"https:\/\/cypro.bg\/en\/it-audit\/","title":{"rendered":"IT Audit"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; module_id=&#8221;it-audit__block-1&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/04\/cyber-security-09-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;center_right&#8221; custom_padding=&#8221;||183px|||&#8221; bottom_divider_style=&#8221;asymmetric2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; module_class=&#8221;block-moin__info&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;67px&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1><span class=\"VIiyi\" jsaction=\"mouseup:BR6jm\" jsname=\"jqKxS\" lang=\"bg\"><span jsaction=\"agoMJf:PFBcW;usxOmf:aWLT7;jhKsnd:P7O7bd,F8DmGf;Q4AGo:Gm7gYd,qAKMYb;uFUCPb:pvnm0e,pfE8Hb,PFBcW;f56efd:dJXsye;EnoYf:KNzws,ZJsZZ,JgVSJc;zdMJQc:cCQNKb,ZJsZZ,zchEXc;Ytrrj:JJDvdc;tNR8yc:GeFvjb;oFN6Ye:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"bg\" data-language-to-translate-into=\"en\" data-phrase-index=\"0\" data-number-of-phrases=\"1\" jscontroller=\"Zl5N8\" jsdata=\"uqLsIf;_;$86\" jsmodel=\"SsMkhd\"><span jsaction=\"click:qtZ4nf,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:qtZ4nf,c2aHje\" jsname=\"W297wb\">IT Audit and <\/span><\/span><\/span><\/h1>\n<h1><span class=\"VIiyi\" jsaction=\"mouseup:BR6jm\" jsname=\"jqKxS\" lang=\"bg\"><span jsaction=\"agoMJf:PFBcW;usxOmf:aWLT7;jhKsnd:P7O7bd,F8DmGf;Q4AGo:Gm7gYd,qAKMYb;uFUCPb:pvnm0e,pfE8Hb,PFBcW;f56efd:dJXsye;EnoYf:KNzws,ZJsZZ,JgVSJc;zdMJQc:cCQNKb,ZJsZZ,zchEXc;Ytrrj:JJDvdc;tNR8yc:GeFvjb;oFN6Ye:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"bg\" data-language-to-translate-into=\"en\" data-phrase-index=\"0\" data-number-of-phrases=\"1\" jscontroller=\"Zl5N8\" jsdata=\"uqLsIf;_;$86\" jsmodel=\"SsMkhd\"><span jsaction=\"click:qtZ4nf,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:qtZ4nf,c2aHje\" jsname=\"W297wb\">Information Security<\/span><\/span><\/span><span><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;Request an assessment&#8221; _builder_version=&#8221;4.10.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#47d7ff&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; hover_enabled=&#8221;0&#8243; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;20px&#8221; box_shadow_blur=&#8221;40px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(23,102,193,0.46)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;20px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25.3&#8243; max_width=&#8221;800px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Rubik|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;|||||&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>IT Audit<\/h3>\n<p><strong>What is it and what does it include?<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;30px||30px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>An IT audit is a systematic evaluation and examination of an organization&#8217;s information technology systems, infrastructure, policies, and processes<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;An assessment of the systems and processes currently in use to protect company data.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_text_align=&#8221;justify&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Determining whether there are potential risks to the company&#8217;s information assets and finding ways to minimize those risks.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-4.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_text_align=&#8221;justify&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Identifying inefficiencies in IT systems and related management.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-41.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_text_align=&#8221;justify&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Checking that information management processes are compliant with IT-specific laws, policies and standards.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-15.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_text_align=&#8221;justify&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Checking the reliability and integrity of the information.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-7.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_text_align=&#8221;justify&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Protection and safeguarding of all assets.&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-12.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; prev_background_color=&#8221;#ffffff&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Feature&#8221; _builder_version=&#8221;4.10.4&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;bottom right&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;center_right&#8221; custom_padding=&#8221;15px||192px|||&#8221; custom_padding_tablet=&#8221;||24vw&#8221; custom_padding_phone=&#8221;&#8221; top_divider_style=&#8221;asymmetric2&#8243; top_divider_height=&#8221;3vw&#8221; bottom_divider_style=&#8221;asymmetric2&#8243; background_last_edited=&#8221;on|desktop&#8221; background_enable_image_tablet=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;30px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|600|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;35px&#8221; background_layout=&#8221;dark&#8221; hover_enabled=&#8221;0&#8243; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1><span>Key aspects and objectives of an IT audit<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;IT auditors examine the controls in place to safeguard data and systems. This includes reviewing access controls, authentication mechanisms, encryption practices, and disaster recovery plans.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Auditors assess whether an organization is in compliance with relevant laws, regulations, and industry standards. This could include regulations like GDPR, NIS, or industry-specific standards like ISO 27001.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;IT audits often focus on identifying and mitigating IT-related risks. Auditors assess the organization&#8217;s risk management practices and whether they align with the organization&#8217;s risk tolerance and business objectives.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Auditors assess an organization&#8217;s readiness to respond to IT disasters or disruptions. This includes evaluating backup systems, recovery plans, and testing procedures.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Ensuring the accuracy and reliability of data is crucial. Auditors may examine data management practices, data backup procedures, and data validation processes.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Evaluating the security of an organization&#8217;s network infrastructure is a common aspect of IT audits. This involves assessing firewalls, intrusion detection\/prevention systems, and network segmentation.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;With the increasing prevalence of cyber threats, IT audits often focus on cybersecurity controls and practices. Auditors may assess vulnerability management, incident response plans, and employee cybersecurity training.&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;%%32%%&#8221; icon_color=&#8221;#FFFFFF&#8221; icon_placement=&#8221;left&#8221; content_max_width=&#8221;1100px&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;justify&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;15px&#8221; header_line_height=&#8221;1.4em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-11-1.png&#8221; title_text=&#8221;cyber-security-11-1&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.10.4&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3122b2&#8243; background_color_gradient_end=&#8221;#00ffd8&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_padding=&#8221;27px||7vw|||&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.10.4&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0421\u0432\u044a\u0440\u0436\u0435\u0442\u0435 \u0441\u0435 \u0441 \u043d\u0430\u0441<\/h1>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%264%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"tel:02 491 83 12\">02 491 83 12<\/a>, <a href=\"tel:+359 888 431 536\">+359 888 431 536<\/a><\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>\u0433\u0440. \u0421\u043e\u0444\u0438\u044f, \u0443\u043b. \u0412\u0438\u0441\u043a\u044f\u0440 \u043f\u043b\u0430\u043d\u0438\u043d\u0430 15-17<\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%238%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"mailto:office@cypro.bg\">office@cypro.bg<\/a><\/h5>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00f6ff&#8221; background_color_gradient_end=&#8221;#00ffbf&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0417\u0430\u043f\u0430\u0437\u0435\u0442\u0435 \u0447\u0430\u0441 \u0437\u0430 \u0441\u0440\u0435\u0449\u0430<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#0a2d61&#8243; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>\u0413\u043e\u0432\u043e\u0440\u0435\u0442\u0435 \u0441 \u0435\u043a\u0441\u043f\u0435\u0440\u0442, \u0437\u0430 \u0434\u0430 \u0437\u0430\u043f\u043e\u0447\u043d\u0435\u0442\u0435 \u0434\u043d\u0435\u0441!<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;\u0417\u0430\u043f\u0430\u0437\u0438 \u0447\u0430\u0441&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.10.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#003070&#8243; button_bg_color_gradient_end=&#8221;#001f4c&#8221; button_bg_color_gradient_type=&#8221;radial&#8221; button_bg_color_gradient_direction=&#8221;140deg&#8221; button_bg_color_gradient_direction_radial=&#8221;top right&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Audit and Information SecurityIT Audit What is it and what does it include?An IT audit is a systematic evaluation and examination of an organization&#8217;s information technology systems, infrastructure, policies, and processesKey aspects and objectives of an IT audit\u0421\u0432\u044a\u0440\u0436\u0435\u0442\u0435 \u0441\u0435 \u0441 \u043d\u0430\u044102 491 83 12, +359 888 431 536\u0433\u0440. \u0421\u043e\u0444\u0438\u044f, \u0443\u043b. \u0412\u0438\u0441\u043a\u044f\u0440 \u043f\u043b\u0430\u043d\u0438\u043d\u0430 15-17office@cypro.bg\u0417\u0430\u043f\u0430\u0437\u0435\u0442\u0435 \u0447\u0430\u0441 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":325,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-25887","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Audit - CyPro Bulgaria Ltd.<\/title>\n<meta name=\"description\" content=\"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cypro.bg\/en\/it-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Audit\" \/>\n<meta property=\"og:description\" content=\"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cypro.bg\/en\/it-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"CyPro Bulgaria Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-27T12:17:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"100\" \/>\n\t<meta property=\"og:image:height\" content=\"100\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/\",\"url\":\"https:\/\/cypro.bg\/en\/it-audit\/\",\"name\":\"IT Audit - CyPro Bulgaria Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/cypro.bg\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png\",\"datePublished\":\"2021-10-29T13:36:35+00:00\",\"dateModified\":\"2023-09-27T12:17:13+00:00\",\"description\":\"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.\",\"breadcrumb\":{\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cypro.bg\/en\/it-audit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png\",\"width\":100,\"height\":100,\"caption\":\"\u0418\u0422 \u043e\u0434\u0438\u0442\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cypro.bg\/en\/it-audit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041d\u0430\u0447\u0430\u043b\u043e\",\"item\":\"https:\/\/cypro.bg\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cypro.bg\/en\/#website\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"name\":\"CyPro Bulgaria Ltd.\",\"description\":\"Tomorrow's protection available today\",\"publisher\":{\"@id\":\"https:\/\/cypro.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cypro.bg\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cypro.bg\/en\/#organization\",\"name\":\"CyPro Bulgaria Ltd.\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"width\":300,\"height\":300,\"caption\":\"CyPro Bulgaria Ltd.\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Audit - CyPro Bulgaria Ltd.","description":"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cypro.bg\/en\/it-audit\/","og_locale":"en_US","og_type":"article","og_title":"IT Audit","og_description":"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.","og_url":"https:\/\/cypro.bg\/en\/it-audit\/","og_site_name":"CyPro Bulgaria Ltd.","article_modified_time":"2023-09-27T12:17:13+00:00","og_image":[{"width":100,"height":100,"url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cypro.bg\/en\/it-audit\/","url":"https:\/\/cypro.bg\/en\/it-audit\/","name":"IT Audit - CyPro Bulgaria Ltd.","isPartOf":{"@id":"https:\/\/cypro.bg\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage"},"image":{"@id":"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png","datePublished":"2021-10-29T13:36:35+00:00","dateModified":"2023-09-27T12:17:13+00:00","description":"\u041f\u0440\u0435\u0433\u043b\u0435\u0434 \u043d\u0430 \u0418\u0422 \u0441\u0438\u0441\u0442\u0435\u043c\u0438\u0442\u0435, \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0442\u0430, \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438\u0442\u0435, \u0442\u044f\u0445\u043d\u043e\u0442\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438 \u0441\u0432\u044a\u0440\u0437\u0430\u043d\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0438 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u0442\u0430.","breadcrumb":{"@id":"https:\/\/cypro.bg\/en\/it-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cypro.bg\/en\/it-audit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/it-audit\/#primaryimage","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png","width":100,"height":100,"caption":"\u0418\u0422 \u043e\u0434\u0438\u0442"},{"@type":"BreadcrumbList","@id":"https:\/\/cypro.bg\/en\/it-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041d\u0430\u0447\u0430\u043b\u043e","item":"https:\/\/cypro.bg\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Audit"}]},{"@type":"WebSite","@id":"https:\/\/cypro.bg\/en\/#website","url":"https:\/\/cypro.bg\/en\/","name":"CyPro Bulgaria Ltd.","description":"Tomorrow's protection available today","publisher":{"@id":"https:\/\/cypro.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cypro.bg\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cypro.bg\/en\/#organization","name":"CyPro Bulgaria Ltd.","url":"https:\/\/cypro.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","width":300,"height":300,"caption":"CyPro Bulgaria Ltd."},"image":{"@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/comments?post=25887"}],"version-history":[{"count":3,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25887\/revisions"}],"predecessor-version":[{"id":27245,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25887\/revisions\/27245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media\/325"}],"wp:attachment":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media?parent=25887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}