Skip to content

Cybersecurity:

By decision of the Minister of Health, the Air Ambulance Service was recognized as a key service operator in the scope of “Command of units of the State Emergency Medical Service system”, consisting in performing the tasks of the administrator of the State Emergency Medical Service Command Support System. The National Emergency Medical Service Monitoring Center is not only a dedicated unit acting as the administrator of the PRM SWD, but also performs the obligations arising from the Act on the national cybersecurity system (Journal of Laws of 2023, item 913).

The subject of the Act is the organization of the national cybersecurity system and the definition of the tasks and obligations of the entities included in it. The Act also regulates the issues of supervision and control in the scope of compliance with its provisions and the procedure for establishing the Cybersecurity Strategy of the Republic of Poland.

By performing one of many statutory obligations, we provide you with access to knowledge that will allow you to understand the threats occurring in cyberspace and to apply effective methods of protection against these threats.

Cybersecurity, in accordance with applicable regulations, is the resistance of information systems to actions that violate the confidentiality, integrity, availability and authenticity of processed data or related services offered by systems.

The most popular types of cyberattacks:

  1. Malware – malicious software that performs actions on a computer without the user’s consent and knowledge to the benefit of a third party, causing damage to the equipment or theft of data. The aforementioned software comes in the form of viruses, worms or Trojan horses.
  2. Man in the Middle – a type of attack in which cybercriminals take over data sent between two entities or people. The aim of such attacks is to intercept information or funds (e.g. by obtaining the necessary login details for the electronic banking system).
  3. Ransomware – a type of malicious software. The aim of the attack is to take over and encrypt the user’s data and then demand a ransom for their recovery.
  4. Phishing – a type of attack using social engineering techniques, using e-mails, telephone calls or sent SMS messages. Cybercriminals impersonate various institutions (offices, banks, mobile network operators, courier companies) and even our friends in order to attempt to take over login details, e.g. bank accounts or social media accounts. Phishing messages are prepared in such a way that they appear authentic.
  5. Cross site scripting – an attack that involves placing a special code on a website, which when clicked by the user redirects to another website (e.g. a competitor’s website).
  6. DDoS – an advanced type of attack on computer systems or a network service that prevents it from working properly by taking up all available resources.
  7. Malvertising – a type of attack used by cybercriminals by spreading malware on user devices using advertisements shared on websites.

Ways to protect yourself from threats:

  1. Use antivirus software with real-time protection. Use a firewall.
  2. Update your antivirus software and virus databases (make sure your virus protection program has this function and does it automatically).
  3. Use only legal software.
    Do not use sites that do not have a valid certificate (e.g. no https protocol) unless you are 100% sure from another source that such a site is safe.
  4. Do not send emails containing confidential data in plain text, encrypt them and protect them with a password that you will pass on to others via a secure communication channel.
  5. Make periodic backups of important data.
  6. Do not open files of unknown origin, emails or attachments.
  7. Pay special attention to attachments with several file extensions at the same time (e.g. document.jar.doc, invoice.pdf.zip).
  8. Protect your devices by using strong passwords and security solutions.
  9. Remember to change your passwords regularly.
  10. Do not use public Wi-Fi networks, e.g. in cafes, airports, restaurants or shopping malls, due to the lack of protection and easy access for cybercriminals.
  11. Do not download and install unknown files, applications or programs, use only official distribution channels.
  12. Do not share your login and password to the system with anyone.
  13. Remember that no bank or office sends e-mails to its clients/interested parties asking for a password or login in order to verify them.

Understanding the threats occurring in cyberspace and using effective methods of protecting yourself against these threats is essential knowledge for every user of a computer, mobile phone or Internet services.

In connection with the above, we encourage you to regularly familiarize yourself with information on cybersecurity published on the websites of:

Ministry of Digital Affairs https://www.gov.pl/web/cyfryzacja
CERT Polska: https://cert.pl
CSIRT NASK https://www.nask.pl/pl/dzialalnosc/csirt-nask/3424,CSIRT-NASK.html


Useful links:


https://www.cert.pl/publikacje/
https://www.cert.pl/ouch/
https://www.gov.pl/web/baza-wiedzy/aktualnosci
https://dyzurnet.pl/

Skip to content