{"id":8897,"date":"2026-02-19T11:19:23","date_gmt":"2026-02-19T09:19:23","guid":{"rendered":"https:\/\/hortusdigital.com\/?p=8897"},"modified":"2026-03-23T12:56:38","modified_gmt":"2026-03-23T10:56:38","slug":"cybersecurity-for-businesses-cyber-hygiene","status":"publish","type":"post","link":"https:\/\/hortusdigital.com\/en\/cybersecurity-for-businesses-cyber-hygiene\/","title":{"rendered":"Cybersecurity for businesses starts with cyber hygiene: key insights from an industry event"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8897\" class=\"elementor elementor-8897 elementor-6899\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61b2d67 e-flex e-con-boxed e-con e-parent\" data-id=\"61b2d67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bcb69e kd-masked-img elementor-widget elementor-widget-image\" data-id=\"2bcb69e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2038\" height=\"748\" src=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1.png\" class=\"attachment-full size-full wp-image-8894\" alt=\"cybersecurity for businesses event Riga\" srcset=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1.png 2038w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1-300x110.png 300w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1-1024x376.png 1024w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1-768x282.png 768w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1-1536x564.png 1536w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_1-671x246.png 671w\" sizes=\"(max-width: 2038px) 100vw, 2038px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3506c7c e-flex e-con-boxed e-con e-parent\" data-id=\"3506c7c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1389d50 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"1389d50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Today, cybersecurity for businesses has become a strategic priority, impacting both financial security and reputation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fea2f6 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"1fea2f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In January, we participated in the Kickstart cybersecurity industry event in Riga, where entrepreneurs, IT leaders, and security experts came together to gain practical insights into digital resilience, cyber risk management, and the role of security monitoring in modern business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daf9299 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"daf9299\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The event was organized by the\u00a0<a href=\"https:\/\/www.itbaltic.com\/en\" target=\"_blank\" rel=\"noopener\">Latvian Information Technology Cluster<\/a>\u00a0and the European Digital Innovation Centre, bringing together technology partners, solution developers, and companies that face cybersecurity challenges on a daily basis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a16586 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"4a16586\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Among the participants and collaboration partners were BITE Latvia, ZZ Dats, Datakom, and other industry representatives who shared their experience, practical scenarios, and perspectives on the development of security in Latvia.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2035145 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"2035145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>HORTUS Digital also took part in the event \u2014 delivering a presentation on the fundamentals of cyber hygiene and hosting a stand, where we met with company representatives, discussed their security challenges, and demonstrated our approach to continuous cybersecurity. This included presenting our\u00a0<a href=\"https:\/\/hortusdigital.com\/en\/cyber-soc\/\" target=\"_blank\" rel=\"noopener\">Cyber-SOC (Security Operations Center) service<\/a>, which provides real-time monitoring and incident management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-274ba31 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"274ba31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security is increasingly becoming a service \u2014 similar to electricity: plug in and use. This model makes high-level cybersecurity solutions accessible to small and medium-sized businesses that do not have their own 24\/7 security teams.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3725e37 elementor-widget elementor-widget-heading\" data-id=\"3725e37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A full room as a signal, not a statistic<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d1578c kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"0d1578c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>A full room at a cybersecurity training is no coincidence. It is a sign that companies are increasingly recognizing that security is no longer just an IT function. Cybersecurity is not a one-time project \u2014 it requires continuous monitoring and clearly defined responsibilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-407f7ef kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"407f7ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The level of interest, engagement, and discussions throughout the day clearly showed that theory alone is no longer enough. Businesses need practice \u2014 simulations, real-life scenarios, and honest risk assessment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77b897b kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"77b897b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is not just about implementing technologies. It is a systematic approach \u2014 people, processes, and tools working together within a unified ecosystem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38770e5 e-flex e-con-boxed e-con e-parent\" data-id=\"38770e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7019e8a kd-masked-img elementor-widget elementor-widget-image\" data-id=\"7019e8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2038\" height=\"748\" src=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2.png\" class=\"attachment-full size-full wp-image-8895\" alt=\"HORTUS Digital expert Oskars Putni\u0146\u0161 presenting on cyber hygiene and cyber risks in businesses\" srcset=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2.png 2038w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2-300x110.png 300w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2-1024x376.png 1024w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2-768x282.png 768w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2-1536x564.png 1536w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_2-671x246.png 671w\" sizes=\"(max-width: 2038px) 100vw, 2038px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3792d97 e-flex e-con-boxed e-con e-parent\" data-id=\"3792d97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e1d55a3 e-con-full e-flex e-con e-child\" data-id=\"e1d55a3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24c3c5f elementor-widget elementor-widget-heading\" data-id=\"24c3c5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">From simulations to reality<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0ec000 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"b0ec000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">Our colleague Oskars Putnins presented real-world, experience-based examples, highlighting the most common areas where risks arise in everyday business operations:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8922f50 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8922f50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">weak or reused passwords<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">phishing emails and SMS messages<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">insecure attachments and links<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">outdated systems<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">unmanaged access rights<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-dot-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">internal incidents<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a07cd7 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"3a07cd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Technically, these may seem like small issues. However, statistically, they are among the most common entry points for cyberattacks. It is in these moments that the true level of an organization\u2019s preparedness becomes visible \u2014 far beyond what documentation may suggest.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-617d301 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"617d301\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Working with companies, we consistently observe recurring mistakes, which can lead to both financial losses and reputational risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44d8eb1 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"44d8eb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As Oskars Putnins emphasized during the event:<\/p><p>\u201cTechnology alone does not solve the problem. Security is a team effort. It only works when technology, people, and processes operate as one system.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8c3ca1 elementor-widget elementor-widget-spacer\" data-id=\"d8c3ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0e5fd9 elementor-widget elementor-widget-heading\" data-id=\"a0e5fd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Where companies are truly vulnerable<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e34fe80 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"e34fe80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>An important perspective was also shared by our CEO, Didzis Simis, who met with companies at the event stand:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-266a546 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"266a546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u201cThe majority of companies do not ignore security \u2014 they simply lack a clear, practical implementation model. Employees need training and additional knowledge. Understanding what works and where the risks are is the foundation of business security.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b827ac1 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"b827ac1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This is exactly why security is increasingly being chosen as a service. Companies are looking for models that ensure continuous monitoring, timely threat detection, and professional incident response \u2014 while allowing them to stay focused on their core business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f890a7 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"2f890a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/hortusdigital.com\/en\/cyber-soc\/\" target=\"_blank\" style=\"font-size: 16px;\">Professional SOC solutions<\/a>&nbsp;enable security to operate in the background \u2014 systematically, structured, and continuously.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-902c22f kd-masked-img elementor-widget elementor-widget-image\" data-id=\"902c22f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2038\" height=\"748\" src=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3.png\" class=\"attachment-full size-full wp-image-8896\" alt=\"HORTUS Digital CEO Didzis Simis presenting cybersecurity solutions to businesses\" srcset=\"https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3.png 2038w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3-300x110.png 300w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3-1024x376.png 1024w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3-768x282.png 768w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3-1536x564.png 1536w, https:\/\/hortusdigital.com\/wp-content\/uploads\/2026\/02\/blog-jaunumi_3-671x246.png 671w\" sizes=\"(max-width: 2038px) 100vw, 2038px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be41863 e-con-full e-flex e-con e-child\" data-id=\"be41863\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca8cc8a elementor-widget elementor-widget-heading\" data-id=\"ca8cc8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key takeaway<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a951bb9 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"a951bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">If we were to summarize the main message of the event in one sentence, it would be this: cybersecurity does not start with an attack \u2014 it starts with hygiene.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-981c979 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"981c979\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">It begins with simple yet critical actions: how we respond to emails and SMS messages, how we create passwords, update software, manage access rights, and report suspicious activity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd0cc57 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"fd0cc57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">A company\u2019s resilience is not defined by whether it will face an incident, but by how quickly it can detect and respond to it.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6495c07 kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"6495c07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">Cybersecurity is not a one-time project \u2014 it is continuous monitoring, clearly defined processes, and a responsible team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18845cc kd-el-typography elementor-widget elementor-widget-text-editor\" data-id=\"18845cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2460\" data-end=\"2615\">Thank you to everyone who participated. We will continue working to ensure that cybersecurity in businesses becomes a conscious and strategic decision \u2014 built on knowledge, experience, and practical solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Today, cybersecurity for businesses has become a strategic priority, impacting both financial security and reputation. In January, we participated in the Kickstart cybersecurity industry event in Riga, where entrepreneurs, IT leaders, and security experts came together to gain practical insights into digital resilience, cyber risk management, and the role of security monitoring in modern business. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"iawp_total_views":3,"footnotes":""},"categories":[71,69],"tags":[72,73],"class_list":["post-8897","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news","category-cybersecurity","tag-company-news","tag-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/posts\/8897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/comments?post=8897"}],"version-history":[{"count":27,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/posts\/8897\/revisions"}],"predecessor-version":[{"id":8925,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/posts\/8897\/revisions\/8925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/media\/8894"}],"wp:attachment":[{"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/media?parent=8897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/categories?post=8897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hortusdigital.com\/en\/wp-json\/wp\/v2\/tags?post=8897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}