logo

Would you like to marry a Nigerian prince?

Do you want your secrets to become public?

Would you like to give someone your wallet?

Our increasingly digital world brings us many benefits.

In addition to the benefits, with digitalization also come some dangers. The greatest of these dangers are cyber security threats.

crown

Do you want a Nigerian prince to marry you?

Who among us, at least once in our lives, has not been greeted in the inbox by the tempting offer of an exotic sender who offers us wealth, tempting business cooperation or a gold mine in inheritance?

You just urgently need to pay a small amount of money for an airline ticket, some kind of bank fee or alike into an unknown account, and in return you will generously receive a multimillion amount to your account.

Of course, this scam is as old as the internet itself.

money
money
money
money
money
money
balloon

Who can be a victim of a
scam like this?

Well, just about anyone who has internet access! Whether it is an individual or an organization. Frequent targets of attacks are celebrities for whose piquancy from private or business life, hackers ask for enormous amounts of money in order not to publish them online.

One of the victims was Madonna, from whom hackers stole confidential business contracts. Everyone remembers the “leak” of confidential emails from presidential candidate Hillary Clinton.

The victims of such attacks are often celebrities from the world of cinema and show business, but of course, the attacks are not limited only to them.

Former Australian Prime Minister Tony Abbott has become the victim of a hacker attack thanks to just one benign Instagram post. He posted a photo of a boarding pass from his flight from Sydney to Tokyo which was enough for the attackers to get to his cell phone number and passport number.

Even an entire city can become a victim of such scams. In 2017, U.S. Atlanta fell victim to a ransomware called WannaCry that blocked data access to most city services.

To get their data back, the city fathers were required to pay hackers more than $ 100,000 while the cost of repairing the total damage caused by this ransomeware damaged the city by more than $ 2.5 million. This hacking action compromised the data of many hospitals, schools, financial institutions, but also private companies that were doing business with the city.

padlock

How to protect yourself
of such content?

The key to protect oneself from such threats is primarily education and awareness of the situations from which this type of danger lurks. However, hacker attacks are becoming more sophisticated and harder to identify, even for people who are advanced users of digital tools.

For these reasons, the only way to stay completely secure is to leave the care of information security to 30SEC experts who, in addition to top expertise, have the most advanced technologies to prevent hacker attacks and thus keep your business data safe and secure.

logo

How does 30SEC work in practice?

ASSESSMENT

Within each organization, the system is specific, so there are almost no two customers with the same needs. The initial step in the implementation of the 30SEC Security Operations Center is to assess the current state of information security and to define the needs for the uninterrupted functioning of the system.

IMPLEMENTATION

After the assessment, and following the customer’s wishes, needs and possibilities, Combis’s team of experts implements all the necessary hardware and software and offers its top human resources to meet the highest standards of information security.

PRODUCTION

After the implementation of the 30SEC service, you can sleep peacefully. Combis engineers and analysts use advanced software solutions to detect all possible threats to your information system and respond to them (antivirus protection, malware protection, firewall, e-mail security, web security). In addition, the collected data are analyzed (SIEM, SOAR) and based on that, we make suggestions for additional system improvements. Also, generated reports can be valuable as an input for various regulators or certification houses.

What are the benefits of the 30SEC service?

Fixed monthly costs

The user only pays for the service,
we are in charge of the equipment.

Knowledge and information sharing - in the case of hacker's attacks in Croatia and / or the region, the customer will be promptly notified of any threats.

Our experts are always at your disposal.

A modular solution - each customer can decide for the set of services which are the most suitable for their business.

Close cooperation with technical teams from equipment manufacturers (IBM, Palo Alto Networks, TrendMicro, Sophos,FireEye, Cisco).

Cookies and similar technologies

We use cookies and similar technologies on our website to save, read out and process information on your device. In doing so, we enhance your experience, analyze site traffic and show you content and ads that interest you. User profiles are created across websites and devices for this purpose. Our partners use these technologies as well.

By selecting "Only Required", you only accept cookies that make our website function properly. "Accept All" means that you allow access to information on your device and the use of all cookies for analytics and marketing purposes by Combis d.o.o and our partners. Your data might then be transferred to countries outside the European Union where we cannot ensure the same level of data protection as in the EU (see Art. 49 (1) a GDPR). Under "Settings", you can specify everything in detail and change your consent at any time.

Find more information in the Privacy Policy and Partner List.

Settings for cookies and similar technologies

We use cookies and similar technologies on our website to save, read out and process information on your device. Our partners use these technologies as well. We and our partners can only use these technologies for analytics and marketing purposes with your consent.

Please use the switches to set your consent and revoke it at any time. You can always open the current page from the footer of our website.

Additional information on consent for data transfers to non-EU countries

Your consent is also the basis for data transfers to non-EU countries (Art. 49 (1) a GDPR). Combis d.o.o. cannot ensure the same level of data protection as in the EU. There is a possibility, for example, that local authorities may have access to your data. Exercising your data protection rights may also be restricted. If you want to know more, please read our information on data processing in non-EU countries and our list of partners.

 


Basic website functionality

These cookies are always active and necessary for our website to function properly.


Combis analytics

These cookies help us improve our understanding of user behavior.

Read More

We use cookies and analytics technologies to get a better understanding of how our website is used. They help us optimize our digital services. For example, we can determine how many people visit our website or a particular service. They are also useful for statistical evaluations that show us how people use our digital services. The analysis is based on pseudonymous information.

Partner List


Combis marketing

We use these cookies to show you personalized ads and content that is relevant to you.

Read More

Cookies and similar marketing technologies ensure that you only see ads that match your interests instead of random ads. We also use marketing technologies to check how well users receive an advertisement. This helps us constantly improve our advertising.

Marketing technologies are also used on the websites of our advertising partners. This is called retargeting. It enables us to show you suitable advertising on other sites as well.

With the help of marketing technologies, we create pseudonymous profiles about the content and ads you view. This information helps us understand what interests you. It also enables us to show you relevant advertising on other websites.

If you are logged in to a website, information about your previous purchases, selected tariffs, options and contract renewals is also included in the creation of advertising profiles. This is done by comparing various IDs with the encrypted e-mail address you use when you log in.

Some of the data is supplemented with socio-demographic information (such as gender, decade of age and zip code) and used for analyses, retargeting and to display personalized content and offers on Combis d.o.o and other websites. Our partners also use this data for their own purposes, e.g. by merging this data with their own data.

If you provide your cookie consent, we also take into account pseudonymized information from your contracts to display personalized offers on Combis d.o.o and other websites. This information is assigned to your user data via a cookie or e-mail hash.

Partner List


Analytics through partners

These cookies help us and our partners improve services.

Read More

We use cookies and similar technologies on our websites to help us improve our services. These technologies are also used by our partners who offer their services independently or under joint responsibility with Combis d.o.o.

Data and information are transmitted to partners for analysis purposes, and sometimes also processed there for the partners' own analysis purposes and merged with third- party data. This means that information about your use of the digital service is collected and processed to better understand and improve our products and offers.

Partner List


Read More

We and our partners use cookies and similar marketing technologies to serve personalized advertising. Some of our partners act independently or in joint controllership with Combis d.o.o. They use these technologies to collect data for marketing purposes. The data can be used for the partners' advertising purposes, processed further and combined with data from other sources.

When you use our website, we create a profile. This helps us show you ads on other websites that are tailored to your interests. We also measure the effectiveness of this advertising and collect further information about your online behavior.

Partner List