{"id":1033,"date":"2022-03-10T10:07:35","date_gmt":"2022-03-10T10:07:35","guid":{"rendered":"http:\/\/glonerpartners.com\/cybersecurity-data-protection\/"},"modified":"2025-09-24T17:01:56","modified_gmt":"2025-09-24T17:01:56","slug":"cybersecurity-data-protection","status":"publish","type":"page","link":"https:\/\/glonerpartners.com\/en\/cybersecurity-data-protection\/","title":{"rendered":"Cybersecurity, data protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1033\" class=\"elementor elementor-1033 elementor-18\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8caa559 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"8caa559\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;3faef1b&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac00463\" data-id=\"ac00463\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84328c2 elementor-widget elementor-widget-tp-row-background\" data-id=\"84328c2\" data-element_type=\"widget\" data-widget_type=\"tp-row-background.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"pt-plus-row-settings\" class=\"pt-plus-row-set theplus_row69e7cfa72eebf     \" data-no=\"theplus_row69e7cfa72eebf\"  data-section-hidden=\"inherit\"><div class=\"pt-plus-columns-bg-wrap tp_bg_desktop columns-bg-anim-colors columns-bg-image   columns_simple_image   \"  id=\"theplus_bgimage69e7cfa72eec0\"    data-parallax_sense=\"30\"  style=\"background:url(http:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/03\/kiberbiztonsag.jpg);background-position: center center;background-repeat: repeat;-webkit-background-size: cover;-moz-background-size: cover;-o-background-size: cover;background-size: cover;background-attachment: scroll;\"><\/div><div id=\"row_canvas_69e7cfa72eedf\" class=\"canvas-style-3\" data-no=\"theplus_row69e7cfa72eebf\" data-type=\"circle\" data-color=\"#CAA76F\"><\/div><div class=\"pt-plus-row-overlay\" style=\"background:#3E2D3382\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05d921c elementor-widget elementor-widget-heading\" data-id=\"05d921c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<br>Data protection<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d7f57d elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"1d7f57d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/glonerpartners.com\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a930ada elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a930ada\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;60a9f72&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e45dd45\" data-id=\"e45dd45\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8747d89 elementor-widget elementor-widget-spacer\" data-id=\"8747d89\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ff5fa2d\" data-id=\"ff5fa2d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7319d9 elementor-widget elementor-widget-text-editor\" data-id=\"b7319d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data protection and cybersecurity are both serious legal and business issues. For example, the way a company handles the data of users, employees and partners directly entrusted with it, or the dataset that can be read from the processes of operation, must be regular and secure in several directions. On the one hand, of course, it must comply with Hungarian and EU data protection and data security rules, while this alone is not always enough: an active cybersecurity toolkit must also be equipped against deliberate attacks, abuses and data thefts. The two areas are therefore closely related and therefore require a complex approach.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ea7a52 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ea7a52\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;721e92d&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c52d27\" data-id=\"2c52d27\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b4fd61 elementor-widget elementor-widget-heading\" data-id=\"4b4fd61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can we help you? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1feef55 elementor-widget elementor-widget-text-editor\" data-id=\"1feef55\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gloner&amp;Partners Law Firm&#8217;s unique IT and legal experts provide complex solutions to our clients, from compiling data protection statements to representing cybersecurity and data protection abuse litigation. We help you navigate between international and domestic data protection laws, and we help reduce corporate data protection risks with legal and IT expert advice. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ba6849 elementor-widget elementor-widget-tp-info-box\" data-id=\"0ba6849\" data-element_type=\"widget\" data-widget_type=\"tp-info-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"info_box69e7cfa7340d3\" class=\"pt_plus_info_box hover_normal    info_box69e7cfa7340d3 info-box-style_1      \"  data-id=\"info_box69e7cfa7340d3\"    dir= data-connection=\"\" data-eventtype=\"\" ><div class=\"post-inner-loop \"><div class=\"info-box-inner content_hover_effect  tp-info-nc\"   ><div class=\"info-box-bg-box   \"><div class=\"service-media text-left  \"><div class=\"m-r-16  service-img-border\"  style=\"border-color: #252525;\"> <div class=\"service-icon-wrap\"><span class=\" service-icon  icon-squre\"><i aria-hidden=\"true\" class=\"far fa-edit\"><\/i><\/span><\/div> <\/div><div class=\"service-content \"><div class=\"service-title \"> Development of policies and declarations <\/div><div class=\"service-border\"> <\/div><div class=\"service-desc\"> <p style=\"text-align: left\">If a company is engaged in online activities (e.g. it operates a webshop, provides registered services to visitors to the website), it must not only ensure data security, but also inform its visitors in a data protection statement about the conditions in which their data is used and managed securely.<\/p><p style=\"text-align: left\">Contact our office and we will prepare a complex data management strategy related to your company's online operation. We can also help you develop privacy and cybersecurity policies.<\/p> <\/div><\/div><\/div><div class=\"infobox-overlay-color \"><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85a211a elementor-widget elementor-widget-tp-info-box\" data-id=\"85a211a\" data-element_type=\"widget\" data-widget_type=\"tp-info-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"info_box69e7cfa73457e\" class=\"pt_plus_info_box hover_normal    info_box69e7cfa73457e info-box-style_1      \"  data-id=\"info_box69e7cfa73457e\"    dir= data-connection=\"\" data-eventtype=\"\" ><div class=\"post-inner-loop \"><div class=\"info-box-inner content_hover_effect  tp-info-nc\"   ><div class=\"info-box-bg-box   \"><div class=\"service-media text-left  \"><div class=\"m-r-16  service-img-border\"  style=\"border-color: #252525;\"> <div class=\"service-icon-wrap\"><span class=\" service-icon  icon-squre\"><i aria-hidden=\"true\" class=\"far fa-edit\"><\/i><\/span><\/div> <\/div><div class=\"service-content \"><div class=\"service-title \"> Data protection and cybersecurity advice <\/div><div class=\"service-border\"> <\/div><div class=\"service-desc\"> <p style=\"text-align: left\">The employer is obliged to ensure that the personal data of its employees is adequately secure. Think of company email addresses, surveillance cameras, access control systems, or even financial and health information \u2014 all of which contain personal information that needs to be handled and protected with increased security.<\/p><p style=\"text-align: left\">In the same way, if a company plans to send newsletters to partners and customers on a regular basis, for example, we will again run into data protection issues. Moreover, if these issues involve foreign parties, i.e. the transfer of data extends across borders, particular caution should be exercised. Contact us and we will provide you with data protection and cybersecurity advice tailored to your company and marketing activities.<\/p> <\/div><\/div><\/div><div class=\"infobox-overlay-color \"><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f1d5df elementor-widget elementor-widget-tp-info-box\" data-id=\"3f1d5df\" data-element_type=\"widget\" data-widget_type=\"tp-info-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"info_box69e7cfa734a08\" class=\"pt_plus_info_box hover_normal    info_box69e7cfa734a08 info-box-style_1      \"  data-id=\"info_box69e7cfa734a08\"    dir= data-connection=\"\" data-eventtype=\"\" ><div class=\"post-inner-loop \"><div class=\"info-box-inner content_hover_effect  tp-info-nc\"   ><div class=\"info-box-bg-box   \"><div class=\"service-media text-left  \"><div class=\"m-r-16  service-img-border\"  style=\"border-color: #252525;\"> <div class=\"service-icon-wrap\"><span class=\" service-icon  icon-squre\"><i aria-hidden=\"true\" class=\"far fa-edit\"><\/i><\/span><\/div> <\/div><div class=\"service-content \"><div class=\"service-title \"> Handling data protection disputes  <\/div><div class=\"service-border\"> <\/div><div class=\"service-desc\"> <p style=\"text-align: left\">If there are data protection violations at the company or you have questions about the interpretation and application of the law by data protection authorities, or if you need advice and legal representation in a case involving cybersecurity, data protection and personal data abuse, please contact the legal team of Gloner Law Firm.<\/p> <\/div><\/div><\/div><div class=\"infobox-overlay-color \"><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5a9d2 elementor-widget elementor-widget-tp-info-box\" data-id=\"ad5a9d2\" data-element_type=\"widget\" data-widget_type=\"tp-info-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"info_box69e7cfa734eb0\" class=\"pt_plus_info_box hover_normal    info_box69e7cfa734eb0 info-box-style_1      \"  data-id=\"info_box69e7cfa734eb0\"    dir= data-connection=\"\" data-eventtype=\"\" ><div class=\"post-inner-loop \"><div class=\"info-box-inner content_hover_effect  tp-info-nc\"   ><div class=\"info-box-bg-box   \"><div class=\"service-media text-left  \"><div class=\"m-r-16  service-img-border\"  style=\"border-color: #252525;\"> <div class=\"service-icon-wrap\"><span class=\" service-icon  icon-squre\"><i aria-hidden=\"true\" class=\"far fa-edit\"><\/i><\/span><\/div> <\/div><div class=\"service-content \"><div class=\"service-title \"> Professional cybersecurity services <\/div><div class=\"service-border\"> <\/div><div class=\"service-desc\"> <p style=\"text-align: left\">With our cybersecurity experts, we provide a range of services to help companies secure their digital operations. In addition to vulnerability scans, vulnerability, cloud security surveys and intrusion testing, source code analysis, we also provide ethical hacking services. But we also have extensive experience in digital trace analytics, Cyber threat hunting, OSINT and Red Teaming services.<\/p><p style=\"text-align: left\">Gloner&amp;Partner\u2019s Cyber Intelligent Center provides its customers with managed security services, advanced analytics, intelligent automation technologies, and integrated cybersecurity services. Our foundation is continuous innovation, the primary purpose of which is complete end-to-end data security. Entrust us with your company's cybersecurity and data protection tasks, and we will work out solutions with the best in the industry.<\/p> <\/div><\/div><\/div><div class=\"infobox-overlay-color \"><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d1d416 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d1d416\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dfc6ead\" data-id=\"dfc6ead\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8db1dab elementor-widget elementor-widget-image\" data-id=\"8db1dab\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"682\" height=\"1024\" src=\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg\" class=\"attachment-large size-large wp-image-772\" alt=\"\" srcset=\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg 682w, https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-200x300.jpg 200w, https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-768x1153.jpg 768w, https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-1023x1536.jpg 1023w, https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter.jpg 1056w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-20536ce\" data-id=\"20536ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aec2880 elementor-widget elementor-widget-heading\" data-id=\"aec2880\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">If you have any question, contact me!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d594fe elementor-widget elementor-widget-text-editor\" data-id=\"7d594fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Peter Gloner, managing partner\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe2cfd elementor-mobile-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3fe2cfd\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:pgloner@glonerpartners.com\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-envelope\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">pgloner@glonerpartners.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c620a6 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"9c620a6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/glonerpartners.com\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book a free consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CybersecurityData protection Contact us Data protection and cybersecurity are both serious legal and business issues. For example, the way a company handles the data of users, employees and partners directly entrusted with it, or the dataset that can be read from the processes of operation, must be regular and secure in several directions. On the &#8230; <a title=\"Cybersecurity, data protection\" class=\"read-more\" href=\"https:\/\/glonerpartners.com\/en\/cybersecurity-data-protection\/\" aria-label=\"Read more about Cybersecurity, data protection\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1033","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda\" \/>\n<meta property=\"og:description\" content=\"CybersecurityData protection Contact us Data protection and cybersecurity are both serious legal and business issues. For example, the way a company handles the data of users, employees and partners directly entrusted with it, or the dataset that can be read from the processes of operation, must be regular and secure in several directions. On the ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/\" \/>\n<meta property=\"og:site_name\" content=\"Gl\u00f3ner \u00dcgyv\u00e9di Iroda\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T17:01:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1056\" \/>\n\t<meta property=\"og:image:height\" content=\"1585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/\",\"url\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/\",\"name\":\"Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda\",\"isPartOf\":{\"@id\":\"https:\/\/glonerpartners.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg\",\"datePublished\":\"2022-03-10T10:07:35+00:00\",\"dateModified\":\"2025-09-24T17:01:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage\",\"url\":\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg\",\"contentUrl\":\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\/\/glonerpartners.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity, data protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/glonerpartners.com\/#website\",\"url\":\"https:\/\/glonerpartners.com\/\",\"name\":\"Gl\u00f3ner \u00dcgyv\u00e9di Iroda\",\"description\":\"jog \u2013 \u00fczlet \u2013 technol\u00f3gia \u2013 innov\u00e1ci\u00f3\",\"publisher\":{\"@id\":\"https:\/\/glonerpartners.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/glonerpartners.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/glonerpartners.com\/#organization\",\"name\":\"Gl\u00f3ner \u00dcgyv\u00e9di Iroda\",\"url\":\"https:\/\/glonerpartners.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/glonerpartners.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/01\/weblogo-gloner.png\",\"contentUrl\":\"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/01\/weblogo-gloner.png\",\"width\":332,\"height\":150,\"caption\":\"Gl\u00f3ner \u00dcgyv\u00e9di Iroda\"},\"image\":{\"@id\":\"https:\/\/glonerpartners.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda","og_description":"CybersecurityData protection Contact us Data protection and cybersecurity are both serious legal and business issues. For example, the way a company handles the data of users, employees and partners directly entrusted with it, or the dataset that can be read from the processes of operation, must be regular and secure in several directions. On the ... Read more","og_url":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/","og_site_name":"Gl\u00f3ner \u00dcgyv\u00e9di Iroda","article_modified_time":"2025-09-24T17:01:56+00:00","og_image":[{"width":1056,"height":1585,"url":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/","url":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/","name":"Cybersecurity, data protection - Gl\u00f3ner \u00dcgyv\u00e9di Iroda","isPartOf":{"@id":"https:\/\/glonerpartners.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage"},"image":{"@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage"},"thumbnailUrl":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg","datePublished":"2022-03-10T10:07:35+00:00","dateModified":"2025-09-24T17:01:56+00:00","breadcrumb":{"@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#primaryimage","url":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg","contentUrl":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/02\/gloner-peter-682x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/glonerpartners.com\/kiberbiztonsag-adatvedelem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/glonerpartners.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity, data protection"}]},{"@type":"WebSite","@id":"https:\/\/glonerpartners.com\/#website","url":"https:\/\/glonerpartners.com\/","name":"Gl\u00f3ner \u00dcgyv\u00e9di Iroda","description":"jog \u2013 \u00fczlet \u2013 technol\u00f3gia \u2013 innov\u00e1ci\u00f3","publisher":{"@id":"https:\/\/glonerpartners.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/glonerpartners.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/glonerpartners.com\/#organization","name":"Gl\u00f3ner \u00dcgyv\u00e9di Iroda","url":"https:\/\/glonerpartners.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/glonerpartners.com\/#\/schema\/logo\/image\/","url":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/01\/weblogo-gloner.png","contentUrl":"https:\/\/glonerpartners.com\/wp-content\/uploads\/2022\/01\/weblogo-gloner.png","width":332,"height":150,"caption":"Gl\u00f3ner \u00dcgyv\u00e9di Iroda"},"image":{"@id":"https:\/\/glonerpartners.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/pages\/1033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/comments?post=1033"}],"version-history":[{"count":35,"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/pages\/1033\/revisions"}],"predecessor-version":[{"id":2567,"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/pages\/1033\/revisions\/2567"}],"wp:attachment":[{"href":"https:\/\/glonerpartners.com\/en\/wp-json\/wp\/v2\/media?parent=1033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}