The Patent Office is a central government administration body established on December 28, 1918, responsible for matters related to industrial property. The tasks of the Patent Office include, among others: accepting and examining applications for inventions, utility models, industrial designs, trademarks, geographical indications, and topographies of integrated circuits, made for the purpose of obtaining protection; making decisions on granting patents and supplementary protection certificates, resolving disputes in contentious proceedings, maintaining the patent register, etc.
Facts and figures
Full name
Urząd Patentowy Rzeczypospolitej Polskiej
Industry
Technology
Products
Public Administration
What did the client expect?
The Patent Office was looking for an experienced company to conduct a network and IT systems security audit. PBSG was chosen for several reasons, including our comprehensive and attractive offer, the flexibility and availability of our consultants, and, most importantly, the fact that this was not our first collaboration – we had previously assisted the office with implementing Service Desk software.
The security audit project was initiated and completed in the fourth quarter of 2022.
What did we do?
WE CONDUCTED THE AUDIT
At the beginning, we assessed the client’s needs, which helped define the plan and scope of the audit for the IT system security and mobile devices.
WE CONDUCTED THE TESTS
We conducted the necessary tests, including internal and external network penetration tests, DDoS attack resistance tests, and social engineering tests.
WE DELIVERED THE REPORT
We summarized the audit results in a clear and practical report, in which we assessed the security level of the network and systems and identified potential areas for improvement.
What were the results?
The audit included penetration tests that simulate potential attacks on the IT environment, helping to identify security gaps. We conducted these tests in a controlled and highly reliable manner, allowing the Patent Office to gain a real assessment of the security measures applied in their IT systems and mobile devices. We also considered the human factor, which is why we conducted social engineering tests to assess employees’ resilience to potential attacks and attempts to extract confidential data.
The audit results were compiled in a report, which included a summary of the tasks performed and recommendations for further actions to improve security. We made sure that the gathered information was clear, readable, and, most importantly, practical and useful for implementation.
What did the client gain?
A reliable and independent assessment of the network and IT systems security.
A clear and practical report.
Recommendations for improving the applied security measures.
Increased employee awareness of IT security.