{"id":1009,"date":"2025-11-16T20:51:38","date_gmt":"2025-11-16T19:51:38","guid":{"rendered":"https:\/\/webdev.cybermark.io\/blog\/blog-title-heading-will-go-here-hr\/"},"modified":"2026-03-31T15:46:47","modified_gmt":"2026-03-31T13:46:47","slug":"kiberneticka-sigurnost-pocinje-sa-cybermarkom","status":"publish","type":"blog","link":"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/","title":{"rendered":"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom"},"content":{"rendered":"\n<section class=\"blog-cover bg--white\">\n    <div class=\"c c--narrow\">\n\n        <span class=\"subtitle\">Cybersecurity learning center<\/span>\n\n        <h1 class=\"h2\">Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom<\/h1>\n\n        <div class=\"blog-cover__info\">\n            <div class=\"blog-cover__info__left\">\n                <div class=\"author-image\">\n                                            <img loading=\"lazy\" decoding=\"async\" class=\"img-cover\" src=\"https:\/\/secure.gravatar.com\/avatar\/d35661f9a8bffc766b58a465d697a61acdeebab854e7286ccd8667ccf555f627?s=96&#038;d=mm&#038;r=g\" alt=\"Maja Cvetkovi\u0107 Rai\u0107\"\n                            width=\"1\" height=\"1\" \/>\n                                    <\/div>\n\n                <div class=\"name-date\">\n                    <p class=\"author-name\"><strong>Maja Cvetkovi\u0107 Rai\u0107<\/strong><\/p>\n\n                    <p>\n                        <span>16 studenoga 2025<\/span>\n                        <span class=\"subtitle js-reading-time\">\n                            0 min read                        <\/span>\n                    <\/p>\n                <\/div>\n            <\/div>\n\n            <ul class=\"blog-cover__info__right\">\n                <li>\n                    <button type=\"button\" class=\"social-icon js-copy-link\" data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M4.222 19.778a4.98 4.98 0 0 0 3.535 1.462 4.99 4.99 0 0 0 3.536-1.462l2.828-2.83-1.414-1.413-2.828 2.829a3.007 3.007 0 0 1-4.243 0 3.005 3.005 0 0 1 0-4.243l2.829-2.828L7.05 9.879l-2.83 2.828a5.006 5.006 0 0 0 0 7.07m15.556-8.485a5.01 5.01 0 0 0 0-7.071 5.006 5.006 0 0 0-7.071 0L9.879 7.05l1.414 1.414 2.828-2.83a3.007 3.007 0 0 1 4.243 0 3.005 3.005 0 0 1 0 4.244l-2.83 2.828 1.415 1.414z\" ><\/path>\n    <path fill=\"#000\" d=\"m8.464 16.95-1.415-1.414 8.487-8.486 1.414 1.415z\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"linkedin\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" fill-rule=\"evenodd\" d=\"M4.5 3.242a1.5 1.5 0 0 0-1.5 1.5v15a1.5 1.5 0 0 0 1.5 1.5h15a1.5 1.5 0 0 0 1.5-1.5v-15a1.5 1.5 0 0 0-1.5-1.5zm4.02 4.003c.006.956-.71 1.545-1.559 1.541a1.5 1.5 0 0 1-1.493-1.54 1.493 1.493 0 0 1 1.54-1.504c.88.02 1.518.665 1.513 1.503m3.76 2.759H9.758v8.56h2.664v-1.34q-.005-1.522.003-3.042c.001-.246.012-.502.075-.737.238-.877 1.027-1.444 1.907-1.305.566.089.94.416 1.097.95.097.332.14.691.145 1.039.012 1.047.01 2.095.008 3.142v1.291h2.671v-1.561q-.003-1.695.001-3.389a6 6 0 0 0-.178-1.507c-.187-.734-.574-1.342-1.203-1.78-.445-.313-.935-.514-1.482-.536l-.188-.01c-.28-.015-.564-.03-.831.024-.765.153-1.437.503-1.945 1.12-.06.071-.117.143-.203.25l-.02.025zm-6.598 8.563h2.65v-8.558h-2.65z\" clip-rule=\"evenodd\" ><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"x\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M17.176 4.242h2.76l-6.03 6.778L21 20.242h-5.554l-4.35-5.593-4.979 5.593H3.355l6.45-7.249L3 4.243h5.695l3.933 5.112zm-.969 14.376h1.53L7.864 5.78h-1.64z\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"facebook\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M22 12.303c0-5.556-4.477-10.06-10-10.06S2 6.746 2 12.302c0 5.022 3.657 9.184 8.438 9.94v-7.031h-2.54v-2.909h2.54v-2.216c0-2.522 1.492-3.915 3.777-3.915 1.094 0 2.238.197 2.238.197v2.476h-1.26c-1.243 0-1.63.775-1.63 1.571v1.887h2.773l-.443 2.909h-2.33v7.03c4.78-.755 8.437-4.917 8.437-9.939\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n            <\/ul>\n        <\/div>\n\n        <div class=\"blog-cover__featured\">\n            <img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Kiberneticka-sigurnost.jpg\" class=\"attachment-full size-full\" alt=\"Kiberneti\u010dka sigurnost\" loading=\"eager\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Kiberneticka-sigurnost.jpg 1200w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Kiberneticka-sigurnost-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Kiberneticka-sigurnost-1024x576.jpg 1024w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Kiberneticka-sigurnost-768x432.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>        <\/div>\n\n    <\/div>\n<\/section>\n\n\n<section class=\"blog-content bg--white pb--md\">\n    <div class=\"c c--narrow\">\n        <p>Kiberneti\u010dki napadi \u0107e se dogoditi. Pitanje je jedino kada. Jedan klik. Jedan otvoreni email. Jedna sekunda nepa\u017enje.I to je dovoljno.<\/p>\n<p>Procjenjuje se da \u010dak 96% cyber napada zapo\u010dinje ljudskom gre\u0161kom. Upravo zato tradicionalni pristupi kiberneti\u010dkoj sigurnosti vi\u0161e nisu dovoljni.<\/p>\n<p>Firewalli, antivirusi i sofisticirani sustavi detekcije prijetnji ne mogu sprije\u010diti zaposlenika da klikne na uvjerljivo dizajniran <a href=\"https:\/\/cyber.hr\/phishing-padaju-kriminalci\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> email.<\/p>\n<p>Ipak, svaki problem ima svoje rje\u0161enje. Cybermark je platforma koja ne \u0161titi samo sustave, nego ljude pretvara u aktivnu liniju obrane.<\/p>\n<h2>Problem koji ne smijete zanemariti<\/h2>\n<p>Ve\u0107ina sigurnosnih strategija fokusirana je na tehnologiju. Ipak, napada\u010di su ve\u0107 odavno shvatili da je najlak\u0161i na\u010din ulaska upravo \u010dovjek.<\/p>\n<p>Phishing napadi danas vi\u0161e nisu o\u010diti. Vi\u0161e ne dolaze s lo\u0161im prijevodima i sumnjivim linkovima.<\/p>\n<p>Danas su personalizirani, lokalizirani i ne razlikuju se od stvarnih poslovnih komunikacija.<\/p>\n<p>Napada\u010di koriste interne stilove komunikacije, stvarne poslovne procese, imena kolega i voditelja poslovanja. Iskori\u0161tavaju aktualnosti i kontekste raznih situacija.<\/p>\n<p>Drugim rije\u010dima, ciljaju psihologiju, ne tehnologiju. Dobro znaju da ljudi nisu trenirani da prepoznaju takve napade u stvarnom vremenu.<\/p>\n<div id=\"attachment_2328\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2328\" class=\"wp-image-2328 size-full\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Tvrtka-poslovanje-napadi-phishing-1.jpg\" alt=\"Tvrtka, poslovanje, napadi, phishing\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Tvrtka-poslovanje-napadi-phishing-1.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Tvrtka-poslovanje-napadi-phishing-1-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Tvrtka-poslovanje-napadi-phishing-1-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2328\" class=\"wp-caption-text\">Tvrtka, poslovanje, napadi, phishing<\/p><\/div>\n<h2>Rje\u0161enje je Cybermark<\/h2>\n<p>Cybermark je platforma vo\u0111ena umjetnom inteligencijom. Njome mo\u017eete zna\u010dajno smanjiti ljudski rizik u kiberneti\u010dkoj sigurnosti.<\/p>\n<p>Svrha platforme nije isklju\u010divo edukativna, ve\u0107 aktivna prevencija napada kroz kombinaciju simulacije, treninga i <em>real-time<\/em> inteligencije.<\/p>\n<p>Platforma objedinjuje tri klju\u010dna elementa:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyber.hr\/phishing-padaju-kriminalci\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> simulacije<\/li>\n<li>personalizirane sigurnosne treninge<\/li>\n<li>informacije o mogu\u0107im prijetnjama u stvarnom vremenu<\/li>\n<\/ul>\n<blockquote><p>Sve u jednom sustavu koji je skalabilan, automatiziran i jednostavan za kori\u0161tenje.<\/p><\/blockquote>\n<p>Cybermark ne reagira na napade! Sprje\u010dava prije nego \u0161to se dogode!<\/p>\n<h2>Kako Cybermark funkcionira<\/h2>\n<p>Cybermark ujedinjuje simulacije napada, pametnu edukaciju i analitiku u stvarnom vremenu kako bi va\u0161u organizaciju pretvorio iz ranjive mete u proaktivnu liniju obrane.<\/p>\n<h3>1. Simulacija stvarnih napada<\/h3>\n<p>Cybermark pokre\u0107e phishing kampanju vo\u0111enu umjetnom inteligencijom. Kampanja vjerno opona\u0161a stvarne prijetnje iz svakodnevnog digitalnog okru\u017eenja.<\/p>\n<p>Za razliku od generi\u010dkih testova koji zaposlenici brzo nau\u010de prepoznati, ove simulacije osmi\u0161ljene su tako da odra\u017eavaju aktualne napade kakvi se uistinu doga\u0111aju.<\/p>\n<p>Primjeri kampanje su slanje obavijesti odjela za ljudske potencijale, zatim financijskih zahtjeva ili dijeljenje dokumenata zaposlenicima u tvrtki.<\/p>\n<div id=\"attachment_2330\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2330\" class=\"wp-image-2330 size-full\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Digitalni-prostor-zastita-Cybermark.jpg\" alt=\"Digitalni prostor, za\u0161tita, Cybermark\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Digitalni-prostor-zastita-Cybermark.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Digitalni-prostor-zastita-Cybermark-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Digitalni-prostor-zastita-Cybermark-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2330\" class=\"wp-caption-text\">Digitalni prostor, za\u0161tita, Cybermark<\/p><\/div>\n<blockquote><p>Posebna vrijednost le\u017ei u tome \u0161to su kampanje personalizirane.<\/p><\/blockquote>\n<p>Svaki zaposlenik dobiva scenarij koji odgovara njegovoj ulozi, odjelu i na\u010dinu rada. Time se pove\u0107ava vjerodostojnost i realnost situacije.<\/p>\n<p>Zaposlenici ne do\u017eivljavaju ove simulacije kao test, nego kao stvarnu komunikaciju. Vrlo je va\u017eno da svaki zaposlenik tvrtke\u00a0dobije autenti\u010dan uvid u pona\u0161anje svojih ljudi.<\/p>\n<p>Rezultat je jasna slika stvarne otpornosti organizacije. Vidi se tko reagira impulzivno, tko dijeli osjetljive podatke i tko na vrijeme prepoznaje prijetnju.<\/p>\n<p>Umjesto pretpostavki, sigurnosni tim dobiva konkretne podatke temeljene na stvarnim reakcijama.<\/p>\n<h3>2. Pra\u0107enje pona\u0161anja i analiza rizika<\/h3>\n<p>Svaka interakcija unutar simulacije pa\u017eljivo se bilje\u017ei i analizira. Cybermark prati kako zaposlenici reagiraju na potencijalne prijetnje.<\/p>\n<p>Kako se pona\u0161aju\u00a0od trenutka kada otvore poruku, preko klika na link, pa sve do eventualnog unosa podataka. Ovi podaci nisu tu samo radi evidencije, nego slu\u017ee kao temelj za dubinsku analizu rizika.<\/p>\n<p>Platforma automatski izra\u0111uje profil rizika za svakog zaposlenika, ali i za timove, odjele i cijelu tvrtku.<\/p>\n<p>Time sigurnosni timovi jasno vide gdje se nalaze najve\u0107e ranjivosti i koji dijelovi tvrtke zahtijevaju dodatnu pa\u017enju.<\/p>\n<blockquote><p>Ovakav pristup omogu\u0107uje dono\u0161enje odluka temeljenih na stvarnim podacima, a ne na pretpostavkama.<\/p><\/blockquote>\n<p>Ujedno zna\u010dajno olak\u0161ava ispunjavanje regulatornih i sigurnosnih zahtjeva. Naime, tvrtka u svakom trenutku ima jasan pregled razine rizika i napretka.<\/p>\n<div id=\"attachment_2331\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2331\" class=\"wp-image-2331 size-full\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Zastita-edukacija-prijetnje-Unsplash.jpg\" alt=\"Za\u0161tita, edukacija, prijetnje, Unsplash\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Zastita-edukacija-prijetnje-Unsplash.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Zastita-edukacija-prijetnje-Unsplash-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Zastita-edukacija-prijetnje-Unsplash-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2331\" class=\"wp-caption-text\">Za\u0161tita, edukacija, prijetnje, <a href=\"http:\/\/unsplash.com\">Unsplash<\/a><\/p><\/div>\n<h3>3. Instant edukacija kroz mikro-treninge<\/h3>\n<p>Cybermark pristupa edukaciji zaposlenika na zanimljiv i privla\u010dan na\u010din. Nema tradicionalnih, dugih i\u00a0neu\u010dinkovitih treninga koje zaposlenici do\u017eivljavaju kao obavezu.<\/p>\n<p>Platforma uvodi koncept u\u010denja u pravom trenutku.<\/p>\n<p>Kada zaposlenik napravi gre\u0161ku (primjerice klikne na sumnjiv link) sustav odmah reagira. Tada zaposlenim nije sankcioniran ili mora i\u0107i na odgo\u0111enu edukaciju.<\/p>\n<p>Tada\u00a0korisnik dobiva kratki, interaktivni mikro-trening koji je direktno povezan s njegovom situacijom.<\/p>\n<blockquote><p>Na taj na\u010din u\u010di iz vlastite pogre\u0161ke, u kontekstu koji mu je poznat i razumljiv.<\/p><\/blockquote>\n<p>Takav pristup ne samo da pove\u0107ava u\u010dinkovitost u\u010denja, nego i poma\u017ee u stvaranju trajnih sigurnosnih navika. Gre\u0161ka vi\u0161e nije problem, ve\u0107 postaje prilika za razvoj i ja\u010danje otpornosti.<\/p>\n<h3>4. Automatizacija koja \u0161tedi vrijeme<\/h3>\n<p>Sigurnosni timovi danas se suo\u010davaju s velikim pritiskom i ograni\u010denim resursima. Cybermark zato stavlja sna\u017ean naglasak na <strong>automatizaciju<\/strong> kako bi smanjio operativno optere\u0107enje.<\/p>\n<p>Jednom kada se kampanje i treninzi postave, platforma preuzima ve\u0107inu posla.<\/p>\n<p>Simulacije se mogu zakazati unaprijed, edukacije se automatski pokre\u0107u, a testiranje zaposlenika odvija se kontinuirano bez potrebe za dodatnim anga\u017emanom.<\/p>\n<div id=\"attachment_2333\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2333\" class=\"size-full wp-image-2333\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Automatizacija-Unsplash.jpg\" alt=\"Automatizacija, Unsplash\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Automatizacija-Unsplash.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Automatizacija-Unsplash-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Automatizacija-Unsplash-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2333\" class=\"wp-caption-text\">Automatizacija, <a href=\"http:\/\/unsplash.com\">Unsplash<\/a><\/p><\/div>\n<p>U pozadini, sustav neprestano prikuplja i obra\u0111uje podatke, dok sigurnosni tim dobiva jasne, strukturirane uvide koji omogu\u0107uju brzo i u\u010dinkovito dono\u0161enje odluka.<\/p>\n<p>Time se \u0161tedi vrijeme, ali i pove\u0107ava ukupna razina sigurnosti bez dodatnog optere\u0107enja.<\/p>\n<h3>5. Informacije o prijetnjama u stvarnom vremenu<\/h3>\n<p>Cybermark nije zatvoren sustav koji djeluje izolirano unutar jedne tvrtke. Naprotiv, njegova snaga dolazi i iz \u0161ire mre\u017ee korisnika i kontinuiranog prikupljanja podataka o prijetnjama.<\/p>\n<p>Platforma koristi te podatke kako bi prepoznala nove phishing kampanje, identificirala obrasce napada i reagirala u stvarnom vremenu.<\/p>\n<p>Takav pristup omogu\u0107uje br\u017eu detekciju i prevenciju prijetnji prije nego \u0161to one naprave \u0161tetu.<\/p>\n<blockquote><p>Umjesto reaktivne sigurnosti, Cybermark omogu\u0107uje proaktivan model za\u0161tite u kojem tvrtke ostaju korak ispred napada\u010da.<\/p><\/blockquote>\n<h2>Za\u0161to tvrtke trebaju edukaciju?<\/h2>\n<p>Jer trenutni pristup kiberneti\u010dkoj sigurnosti ima veliki propust &#8211; zanemaruje ljudski faktor.<\/p>\n<p>Zaposlenici su\u00a0preoptere\u0107eni informacijama, nedovoljno educirani i izlo\u017eeni sve sofisticiranijim napadima<\/p>\n<p><strong>Cybermark postoji da:<\/strong><\/p>\n<ul>\n<li>smanji ljudsku pogre\u0161ku<\/li>\n<li>pove\u0107a svijest<\/li>\n<li>pretvori zaposlenike u aktivnu obranu<\/li>\n<\/ul>\n<p>Mo\u017eemo re\u0107i da gradi ljudski vatrozid!<\/p>\n<div id=\"attachment_2335\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2335\" class=\"wp-image-2335 size-full\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Edukacija-Unsplash.jpg\" alt=\"Edukacija, Unsplash\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Edukacija-Unsplash.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Edukacija-Unsplash-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Edukacija-Unsplash-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2335\" class=\"wp-caption-text\">Edukacija, Unsplash<\/p><\/div>\n<h2>Prednosti platforme<\/h2>\n<p>Prednosti je mnogo, no pro\u010ditajte najva\u017enije:<\/p>\n<h3>Zaustavlja phishing prije nego \u0161to napravi \u0161tetu<\/h3>\n<p>Simulacije pripremaju zaposlenike prije stvarnih napada.<\/p>\n<h3>U\u010di u pravom trenutku<\/h3>\n<p>Mikro-treninzi dolaze to\u010dno kada su najpotrebniji.<\/p>\n<h3>Donosi odluke temeljene na podacima<\/h3>\n<p>Risk score omogu\u0107uje jasnu sliku sigurnosnog stanja.<\/p>\n<h3>Umjetna inteligencija koja stalno u\u010di<\/h3>\n<p>Svaka nova interakcija \u010dini sustav pametnijim i preciznijim.<\/p>\n<h3>Skalabilnost bez kompleksnosti<\/h3>\n<p>Od startupa do enterprise kompanija \u2014 platforma raste s vama.<\/p>\n<h3>Regulatorna uskla\u0111enost bez stresa<\/h3>\n<p>Pra\u0107enje i izvje\u0161taji poma\u017eu u ispunjavanju standarda poput:<\/p>\n<p>ISO 27001, <a href=\"https:\/\/zaposlise.hr\/blog\/gdpr\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>, <a href=\"https:\/\/cyber.hr\/enisa-package-manager\/\" target=\"_blank\" rel=\"noopener\">NIS2<\/a>.<\/p>\n<div id=\"attachment_2336\" style=\"width: 850px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2336\" class=\"size-full wp-image-2336\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Financijski-sektor-Unsplash.jpg\" alt=\"Financijski sektor Unsplash\" width=\"840\" height=\"473\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Financijski-sektor-Unsplash.jpg 840w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Financijski-sektor-Unsplash-300x169.jpg 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/Financijski-sektor-Unsplash-768x432.jpg 768w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><p id=\"caption-attachment-2336\" class=\"wp-caption-text\">Financijski sektor; <a href=\"http:\/\/unsplash.com\">Unsplash<\/a><\/p><\/div>\n<h2>Kome je Cybermark namijenjen?<\/h2>\n<p>Cybermark je ovdje za sve tvrtke koje razumiju da sigurnost nije samo IT problem.<\/p>\n<ul>\n<li><strong>Financijski sektor<\/strong> (banke, fintech)<\/li>\n<\/ul>\n<p>Za\u0161tita financijskih podataka i povjerenja klijenata.<\/p>\n<ul>\n<li><strong>Vlade i javne institucije<\/strong><\/li>\n<\/ul>\n<p>Ja\u010danje sigurnosti na razini cijelog sustava.<\/p>\n<ul>\n<li><strong>Osiguravaju\u0107a dru\u0161tva<\/strong><\/li>\n<\/ul>\n<p>Smanjenje rizika i za\u0161tita osjetljivih podataka.<\/p>\n<ul>\n<li><strong>Zdravstvo<\/strong><\/li>\n<\/ul>\n<p>Za\u0161tita pacijenata i kriti\u010dne infrastrukture.<\/p>\n<ul>\n<li><strong>Obrazovanje<\/strong><\/li>\n<\/ul>\n<p>Edukacija velikog broja korisnika na jednostavan na\u010din.<\/p>\n<ul>\n<li><strong>Industrija i proizvodnja<\/strong><\/li>\n<\/ul>\n<p>Za\u0161tita operativnih sustava i kontinuiteta poslovanja.<\/p>\n<p>Svaka tvrtka koja ima zaposlenike (a to zna\u010di sve) ima i potencijalni sigurnosni rizik.<\/p>\n<h2>Koliko je sigurno dovoljno sigurno?<\/h2>\n<p>Pitanje je koje si svaka tvrtka postavlja.<\/p>\n<p><strong>Cybermark daje konkretan odgovor kroz:<\/strong><\/p>\n<ul>\n<li>metrike<\/li>\n<li>analitiku<\/li>\n<li>kontinuirano pobolj\u0161anje<\/li>\n<\/ul>\n<p>Sigurnost vi\u0161e nije osje\u0107aj, nego mjerljiva kategorija.<\/p>\n\n            <\/div>\n<\/section>\n\n\n<section class=\"blog-content bg--light pt--md pb--md\">\n    <div class=\"c c--narrow\">\n        <h2>NIS2 Direktiva &amp; ZKS: 5 na\u010dina kako posti\u0107i uskla\u0111enost<\/h2>\n<h3>#1: Explain the Why Behind the Tool<\/h3>\n<p>Rolling out new software without context is a surefire way to spark resistance. Of course you think it\u2019s the best thing since sliced bread \u2013 but you\u2019ve done the research, sat through demo calls, and gotten familiar with the tool\u2019s capabilities. For your team, this may be the first they\u2019re hearing of it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-695 size-full\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/5a2ce2e4186fb2de06ff6c6927f719a2e041bb12.png\" alt=\"\" width=\"1440\" height=\"967\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/5a2ce2e4186fb2de06ff6c6927f719a2e041bb12.png 1440w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/5a2ce2e4186fb2de06ff6c6927f719a2e041bb12-300x201.png 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/5a2ce2e4186fb2de06ff6c6927f719a2e041bb12-1024x688.png 1024w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/5a2ce2e4186fb2de06ff6c6927f719a2e041bb12-768x516.png 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<h3>#2: Appoint Internal Champions for Key Areas<\/h3>\n<p>There\u2019s no need to hire LinkedIn influencers to drive user adoption \u2013 your best advocates are already in the building. Internal champions make software adoption smoother by leading from within.<\/p>\n<p>At Productive, we suggest appointing champions for each key area like\u00a0project management, budgeting, time off, and resource planning. These are typically the people already managing those processes: project managers, HR admins, department heads, and similar roles.<\/p>\n<p><strong>Champions:<\/strong><\/p>\n<ul>\n<li>Act as the bridge between software provider and team<\/li>\n<li>Use the platform first and receive training<\/li>\n<li>Share updates and tips in a familiar voice<\/li>\n<\/ul>\n\n            <\/div>\n<\/section>\n\n\n<section class=\"blog-content bg--dark pt--md pb--md\">\n    <div class=\"c c--narrow\">\n        <h2>What We Mean by Software Adoption<\/h2>\n<p>Software adoption is the process of getting your team to actively and consistently use a new software application as part of their daily work. It\u2019s not a matter of handing out logins and showing everyone where the dashboard is \u2013 the goal is to help them understand the tool, see its value, and learn how to integrate it into their workflows.<\/p>\n<p>Unlike product adoption in SaaS (which focuses on end-users and markets), this is about internal user adoption \u2013 getting your own people on board.<\/p>\n<blockquote><p>Pro tip: You can create your internal handbook directly in Productive Docs. Add videos, screenshots, and custom instructions; leave comments for updates or clarifications. This way, you\u2019re building a living, team-specific guide that\u2019s always accessible when someone needs a refresher.<\/p><\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-697\" src=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/b1c1e3aee86af75027bf2f855c94fab7035fcc46.png\" alt=\"\" width=\"1440\" height=\"900\" srcset=\"https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/b1c1e3aee86af75027bf2f855c94fab7035fcc46.png 1440w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/b1c1e3aee86af75027bf2f855c94fab7035fcc46-300x188.png 300w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/b1c1e3aee86af75027bf2f855c94fab7035fcc46-1024x640.png 1024w, https:\/\/webdev.cybermark.io\/wp-content\/uploads\/2025\/11\/b1c1e3aee86af75027bf2f855c94fab7035fcc46-768x480.png 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n\n            <\/div>\n<\/section>\n\n\n<section class=\"blog-content bg--white pt--md pb--md\">\n    <div class=\"c c--narrow\">\n        <h2>What We Mean by Software Adoption<\/h2>\n<p>Software adoption is the process of getting your team to actively and consistently use a new software application as part of their daily work. It\u2019s not a matter of handing out logins and showing everyone where the dashboard is \u2013 the goal is to help them understand the tool, see its value, and learn how to integrate it into their workflows.<\/p>\n<p>Unlike product adoption in SaaS (which focuses on end-users and markets), this is about internal user adoption \u2013 getting your own people on board.<\/p>\n<h2>Why Software Adoption Matters<\/h2>\n<p>Because tools can only bring you value when people actually use them.<\/p>\n<p>Teams can sometimes resist change, and how you approach the initial introduction will have long term-effects for software adoption. Failing to handle it right can easily turn that initial skepticism into rejection \u2013 wasting time, money, and momentum, while your team misses out on the very benefits the tool was meant to bring.<\/p>\n<p>And nobody wants to fall back on spreadsheets and fragmented tools.<\/p>\n\n                <div class=\"blog-content__info\">\n            <div class=\"blog-content__info__left\">\n                <div class=\"author-image\">\n                                            <img loading=\"lazy\" decoding=\"async\" class=\"img-cover\" src=\"https:\/\/secure.gravatar.com\/avatar\/d35661f9a8bffc766b58a465d697a61acdeebab854e7286ccd8667ccf555f627?s=96&#038;d=mm&#038;r=g\" alt=\"Maja Cvetkovi\u0107 Rai\u0107\" width=\"1\" height=\"1\" \/>\n                                    <\/div>\n\n                <div class=\"name-date\">\n                    <p class=\"author-name\"><strong>Maja Cvetkovi\u0107 Rai\u0107<\/strong><\/p>\n                <\/div>\n            <\/div>\n\n            <ul class=\"blog-content__info__right\">\n                <li>\n                    <button type=\"button\" class=\"social-icon js-copy-link\" data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M4.222 19.778a4.98 4.98 0 0 0 3.535 1.462 4.99 4.99 0 0 0 3.536-1.462l2.828-2.83-1.414-1.413-2.828 2.829a3.007 3.007 0 0 1-4.243 0 3.005 3.005 0 0 1 0-4.243l2.829-2.828L7.05 9.879l-2.83 2.828a5.006 5.006 0 0 0 0 7.07m15.556-8.485a5.01 5.01 0 0 0 0-7.071 5.006 5.006 0 0 0-7.071 0L9.879 7.05l1.414 1.414 2.828-2.83a3.007 3.007 0 0 1 4.243 0 3.005 3.005 0 0 1 0 4.244l-2.83 2.828 1.415 1.414z\" ><\/path>\n    <path fill=\"#000\" d=\"m8.464 16.95-1.415-1.414 8.487-8.486 1.414 1.415z\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"linkedin\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" fill-rule=\"evenodd\" d=\"M4.5 3.242a1.5 1.5 0 0 0-1.5 1.5v15a1.5 1.5 0 0 0 1.5 1.5h15a1.5 1.5 0 0 0 1.5-1.5v-15a1.5 1.5 0 0 0-1.5-1.5zm4.02 4.003c.006.956-.71 1.545-1.559 1.541a1.5 1.5 0 0 1-1.493-1.54 1.493 1.493 0 0 1 1.54-1.504c.88.02 1.518.665 1.513 1.503m3.76 2.759H9.758v8.56h2.664v-1.34q-.005-1.522.003-3.042c.001-.246.012-.502.075-.737.238-.877 1.027-1.444 1.907-1.305.566.089.94.416 1.097.95.097.332.14.691.145 1.039.012 1.047.01 2.095.008 3.142v1.291h2.671v-1.561q-.003-1.695.001-3.389a6 6 0 0 0-.178-1.507c-.187-.734-.574-1.342-1.203-1.78-.445-.313-.935-.514-1.482-.536l-.188-.01c-.28-.015-.564-.03-.831.024-.765.153-1.437.503-1.945 1.12-.06.071-.117.143-.203.25l-.02.025zm-6.598 8.563h2.65v-8.558h-2.65z\" clip-rule=\"evenodd\" ><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"x\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M17.176 4.242h2.76l-6.03 6.778L21 20.242h-5.554l-4.35-5.593-4.979 5.593H3.355l6.45-7.249L3 4.243h5.695l3.933 5.112zm-.969 14.376h1.53L7.864 5.78h-1.64z\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n\n                <li>\n                    <button type=\"button\" class=\"social-icon js-share\" data-share=\"facebook\"\n                        data-url=\"https:\/\/webdev.cybermark.io\/hr\/blog\/kiberneticka-sigurnost-pocinje-sa-cybermarkom\/\" data-title=\"Kiberneti\u010dka sigurnost po\u010dinje sa Cybermarkom\">\n                        <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n    <path fill=\"#000\" d=\"M22 12.303c0-5.556-4.477-10.06-10-10.06S2 6.746 2 12.302c0 5.022 3.657 9.184 8.438 9.94v-7.031h-2.54v-2.909h2.54v-2.216c0-2.522 1.492-3.915 3.777-3.915 1.094 0 2.238.197 2.238.197v2.476h-1.26c-1.243 0-1.63.775-1.63 1.571v1.887h2.773l-.443 2.909h-2.33v7.03c4.78-.755 8.437-4.917 8.437-9.939\"><\/path>\n<\/svg>                    <\/button>\n                <\/li>\n            <\/ul>\n        <\/div>\n            <\/div>\n<\/section>\n\n\n<section class=\"featured-blogs bg--white reverse-- pt--md pb--md\">\n    <div class=\"c\">\n        <div class=\"featured-blogs__top\">\n            <div class=\"featured-blogs__top__left\">\n                                    <span class=\"subtitle\">OUR INSIGHTS<\/span>\n                \n                                    <h2 class=\"h2\">Threat protection resources<\/h2>\n                \n                            <\/div>\n\n                            <div class=\"featured-blogs__top__right\">\n                    <a class=\"btn btn--transparent btn--icon-yes\" href=\"https:\/\/webdev.cybermark.io\/blogs\/\"\n                        target=\"\">\n                        <span class=\"label\">See All<\/span>\n                                                    <span class=\"btn-icon btn-icon--transparent\">\n                                <svg class=\"icon\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 8 8\">\n    <path stroke-linecap=\"square\" stroke-miterlimit=\"10\" stroke-width=\"1.5\" d=\"M1.524.75h5.539v5.538m-.385-5.153L1.063 6.75\"><\/path>\n<\/svg>                            <\/span>\n                                            <\/a>\n                <\/div>\n                    <\/div>\n\n                    <div class=\"featured-blogs__items\">\n                                    \n                    <a class=\"blog\" href=\"\">\n                        \n                        <div class=\"blog__ctn\">\n                            \n                            <h3 class=\"h5\"><\/h3>\n                            <p class=\"excerpt\"><\/p>\n                        <\/div>\n                    <\/a>\n\n                                            <div class=\"separator\"><\/div>\n                                                        \n                    <a class=\"blog\" href=\"\">\n                        \n                        <div class=\"blog__ctn\">\n                            \n                            <h3 class=\"h5\"><\/h3>\n                            <p class=\"excerpt\"><\/p>\n                        <\/div>\n                    <\/a>\n\n                                            <div class=\"separator\"><\/div>\n                                                        \n                    <a class=\"blog\" href=\"\">\n                        \n                        <div class=\"blog__ctn\">\n                            \n                            <h3 class=\"h5\"><\/h3>\n                            <p class=\"excerpt\"><\/p>\n                        <\/div>\n                    <\/a>\n\n                                                <\/div>\n        \n    <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean accumsan.<\/p>\n","protected":false},"featured_media":2317,"menu_order":0,"template":"","categories":[18],"tags":[36,37,38,39,40],"class_list":["post-1009","blog","type-blog","status-publish","has-post-thumbnail","hentry","category-cybersecurity-learning-center","tag-cybermark","tag-edukacija","tag-kiberneticka-sigurnost","tag-phishing","tag-platforma"],"acf":[],"_links":{"self":[{"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/blog\/1009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/types\/blog"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/media?parent=1009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/categories?post=1009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.cybermark.io\/hr\/wp-json\/wp\/v2\/tags?post=1009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}