EN
How it works
Offer
For whom?
E-commerce
Conference support
Mass events
Hotels
Telecommunications operators
Commercial developers
Hospitals and medical facilities
Sports facilities
Office building managers
Large corporations
Micro companies – SOHO
Startups
Blog
Business
Help
Contact
PL
DE
UK
Offer
Recommended ITH services
Symmetrical Internet access for ITH Net business
WiFi as a Service
Network as a Service
Managed Firewall
Asymmetric SOHO internet access
Symmetrical Internet access for ITH Net business
Data transmission
WiFi as a Service
ITH network
Connection with global clouds
Television for hotels and business
ITH Ready
Public Cloud
Connection with global clouds
Dedicated servers
Collocation
Co-location facilities
Connection with global clouds
Server administration
IT security audit
Infrastructure vulnerability scans
AntiDDoS protection
Managed Firewall
Backups
IT services for companies
Conference and event services
IT audit
Server infrastructure administration
Network infrastructure administration
Network as a Service
WiFi as a Service
Security services
Computer and network equipment
Network management by ITH engineering team
WiFi Design and Measurement
Virtual Headquarters
SIP Trunk
A phone subscription
IP Phones
Web Systems
Construction of structural networks
Video surveillance
Access control systems
Alarm Systems
Smart Buildings
Fiber optic welding and measurements
Services for operators
Recommended ITH services
Symmetrical Internet access for ITH Net business
WiFi as a Service
Network as a Service
Managed Firewall
Help
FAQ
Privacy Policy
RODO
Documents and Regulations
Business
Affiliate Programme
Our partners
About us
ITH Ready
Investors
Press office
ITH Academy
News
References
For whom?
E-commerce
Conference support
Mass events
Hotels
Telecommunications operators
Commercial developers
Hospitals and medical facilities
Sports facilities
Office building managers
Large corporations
Micro companies – SOHO
Startups
Data security
Homepage
Categories
Security
Data security
SSL Certificate
Trivia
Cloud computing
Firewall
Hosting
Internet
Securing your computer
RODO
27.02.2024
Security
Password Spraying – Recognizing, preventing and minimizing risks
Each of us uses many online accounts and platforms that are protected only by a thin barrier – our...
13.02.2024
Security
SLA in business – how to ensure the best quality of service?
An SLA is not an ordinary type of contract. It is a promise from the supplier to the customer...
06.02.2024
Security
Cyber security in business – how to avoid the pitfalls of Whaling and Business Email Compromise?
In a cyber world full of threats, concepts such as Whaling and Business Email Compromise are no longer just...
30.01.2024
Security
DORA – what you need to know and how to prepare – a guide for the financial sector and ICT providers
The financial sector in the European Union is facing another major regulatory change – the DORA (Digital Operational Resilience...
23.01.2024
Security
How does redundancy in technology protect your business? Learn the benefits of redundancy!
Operational continuity and data protection are integral components of IT asset management. Redundancy mechanisms are used to ensure high...
16.01.2024
Data security
Protecting the corporate network – comparison of software and hardware firewalls
Network security is one of the cornerstones of any enterprise’s online operations. A firewall, or firewall, is one of...
29.12.2023
Security
Don’t get caught! Everything you should know about Phishing
There was a time when clumsily worded emails from cybercriminals were as easy to detect as a cactus in...
24.07.2023
Security
Unsecured page – why did Chrome mark it that way?
You turn on a site in your Chrome browser and see an “Unsecured” message next to the box that...
03.07.2023
Security
How does the password manager work?
Did you know that people who don’t use a password manager are three times more likely to have their...
12.06.2023
Knowledge Base
Security in the cloud – how to protect your data?
Nowadays, more and more people are using cloud computing to store and manage their data. However, with the growing...
1
2
3
4
Next