As your technology partner, I prioritize the security of your e-commerce. In the era of the NIS2 directive and GDPR, I ensure you don't have to worry about the "backstage". Below you will find a transparent list of procedures, tools, and standards I apply in every project.
Web Berserker Security
Data Encryption
FileVault / SSH / SSL
Backup Policy
3-2-1 Strategy
Code Access
MFA & Hardware Keys
Your data is only as secure as the hardware it is processed on. I make no compromises regarding digital hygiene.
I work on dedicated Apple hardware (macOS) with active, full disk encryption (FileVault). In case of theft or loss involved, your data, source codes, and passwords remain mathematically impossible to read.
I apply a rigorous password policy. I use the Bitwarden password manager, generating unique high-entropy character strings. All access to repositories and servers is protected by multi-factor authentication (MFA/2FA).
Secure code is created before it hits the production server. My workflow with Laravel and PrestaShop projects is based on isolation and control.
.env files with passwords to the repository. They are transmitted via a secure channel.
Data is the currency of your business. I apply a strategy that minimizes the risk of loss in case of server failure or ransomware attack.
In case of detecting an incident (break-in, critical failure), I launch a proven 5-step procedure to minimize losses.
Immediate cutoff of infected resources or shutting down the store to stop the attack.
Identification of attack vector and damage scope based on server and application logs.
Patching the vulnerability that enabled the attack (e.g., module update, password change).
Restoring a clean version of the store from a secure, verified backup.
Providing information about causes, effects, and preventive steps taken.
Security is also about choosing the right partners and clear cooperation rules. I recommend and work exclusively on proven infrastructure that ensures appropriate SLA levels and service separation.
Information contained on this page constitutes a description of technical and organizational standards applied by Web Berserker Michał Sobczak. Legal requirements regarding specific entities (e.g., key entities under the KSC/NIS2 act) may require individual arrangements and additional data processing entrustment agreements.
Web Berserker
Michał Sobczak
Address: os. Jana III Sobieskiego 40/2N, Poznań 60-688
NIP: PL5761591075
Designed by Jagoda Szerement
Copyright © 2026 Web Berserker Michał Sobczak | All Rights Reserved