{"id":4675,"date":"2026-03-31T12:30:10","date_gmt":"2026-03-31T10:30:10","guid":{"rendered":"https:\/\/intelion.pl\/?p=4675"},"modified":"2026-03-31T12:30:10","modified_gmt":"2026-03-31T10:30:10","slug":"co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie","status":"publish","type":"post","link":"https:\/\/intelion.pl\/en\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/","title":{"rendered":"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie"},"content":{"rendered":"<div id=\"fws_6a0e65e6856bc\"  data-column-margin=\"default\" data-midnight=\"dark\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row full-width-section  bottom_margin_2pct\"  style=\"padding-top: 0px; padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>W wielu firmach IT funkcjonuje w tle. Systemy s\u0105 dost\u0119pne, poczta dzia\u0142a, a backup \u201egdzie\u015b tam si\u0119 robi\u201d. Dop\u00f3ki jest informatyk, wszystko wydaje si\u0119 pod kontrol\u0105.<\/p>\n<p>Problem pojawia si\u0119 w momencie, gdy ta jedna osoba przestaje by\u0107 dost\u0119pna \u2013 przez zmian\u0119 pracy, d\u0142u\u017csz\u0105 nieobecno\u015b\u0107, konflikt albo zako\u0144czenie wsp\u00f3\u0142pracy. Wtedy szybko wychodzi na jaw, \u017ce IT w firmie nie by\u0142o systemem, lecz wiedz\u0105 skupion\u0105 w jednej osobie.<\/p>\n<p>Z naszej perspektywy to jeden z najcz\u0119stszych moment\u00f3w, w kt\u00f3rych firmy zaczynaj\u0105 realnie przygl\u0105da\u0107 si\u0119 swojemu IT \u2013 nie dlatego, \u017ce chc\u0105 co\u015b ulepszy\u0107, ale dlatego, \u017ce musz\u0105 odzyska\u0107 kontrol\u0119.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e6860ba\"  data-br=\"10px\" data-br-applies=\"bg\" data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"2%\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row full-width-section vc_row-o-equal-height vc_row-flex  top_margin_2pct bottom_margin_2pct right_padding_10pct left_padding_10pct\"  style=\"padding-top: calc(100vw * 0.02); padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop using-bg-color\"  style=\"background-color: #eaeaea; \"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding force-desktop-text-align-left inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-check\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<h3 style=\"text-align: left;\" data-start=\"1021\" data-end=\"1035\"><strong>Tematy w poni\u017cszym artykule:<\/strong><\/h3>\n<ul>\n<li style=\"text-align: left;\" data-start=\"1039\" data-end=\"1094\">IT oparte na jednej osobie \u2013 wygodne, ale ryzykowne<\/li>\n<li style=\"text-align: left;\" data-start=\"1144\" data-end=\"1194\">Co naprawd\u0119 dzieje si\u0119 po odej\u015bciu informatyka?<\/li>\n<li style=\"text-align: left;\" data-start=\"1198\" data-end=\"1245\">Jak zabezpieczy\u0107 firm\u0119 przed tym scenariuszem?<\/li>\n<li>Outsourcing IT \u2013 koniec zale\u017cno\u015bci od jednej osoby<\/li>\n<li>Podsumowanie<\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e6866db\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >IT oparte na jednej osobie \u2013 wygodne, ale ryzykowne<\/h2>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>W ma\u0142ych i \u015brednich firmach to standardowy model. Jeden informatyk (wewn\u0119trzny lub zewn\u0119trzny) z czasem przejmuje pe\u0142n\u0105 kontrol\u0119 nad \u015brodowiskiem:<\/p>\n<ul>\n<li>zna wszystkie dost\u0119py,<\/li>\n<li>konfiguruje systemy,<\/li>\n<li>rozwi\u0105zuje problemy \u201ena bie\u017c\u0105co\u201d.<\/li>\n<\/ul>\n<p>Na pierwszy rzut oka dzia\u0142a sprawnie. Z biznesowego punktu widzenia oznacza to jednak jedno: <strong>ca\u0142e IT zale\u017cy od dost\u0119pno\u015bci jednej osoby. <\/strong><\/p>\n<p>To ryzyko nie jest tylko teoretyczne. Wed\u0142ug <a href=\"https:\/\/finance.yahoo.com\/news\/apqc-study-warns-looming-great-130000249.html\">bada\u0144 APQC<\/a> a\u017c 92% organizacji nie przechwytuje wiedzy w spos\u00f3b systematyczny. Problem ten jest szczeg\u00f3lnie widoczny w kontek\u015bcie odchodzenia pracownik\u00f3w na emerytur\u0119, ale w praktyce dotyczy ka\u017cdej sytuacji, w kt\u00f3rej wiedza nie jest przekazywana dalej. Know-how cz\u0119sto \u201ewychodzi z firmy razem z pracownikiem\u201d.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e6871d1\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"2%\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row  top_margin_2pct bottom_margin_2pct\"  style=\"padding-top: calc(100vw * 0.02); padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Co naprawd\u0119 dzieje si\u0119 po odej\u015bciu informatyka?<\/h2><div class=\"divider-wrap\" style=\"opacity: 0.15;\" data-alignment=\"default\"><div style=\"margin-top: 40px; width: 200px; height: 1px; margin-bottom: 40px;\" data-width=\"200px\" data-animate=\"\" data-animation-delay=\"\" data-color=\"black\" class=\"divider-small-border\"><\/div><\/div><div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-check\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"10px\" data-alignment=\"left\"> W praktyce ten moment bardzo szybko weryfikuje, jak wygl\u0105da\u0142o zarz\u0105dzanie IT w firmie.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Brak dost\u0119pu do kluczowych system\u00f3w<\/strong><\/h3>\n<p>Jednym z pierwszych problem\u00f3w jest dost\u0119p. Okazuje si\u0119, \u017ce:<\/p>\n<ul>\n<li>nikt nie ma pe\u0142nych uprawnie\u0144 administracyjnych,<\/li>\n<li>nie wiadomo, gdzie s\u0105 przechowywane has\u0142a,<\/li>\n<li>dost\u0119p do kluczowych system\u00f3w jest ograniczony lub niejasny.<\/li>\n<\/ul>\n<p>W skrajnych przypadkach firmy trac\u0105 kontrol\u0119 nad w\u0142asn\u0105 infrastruktur\u0105 i musz\u0105 j\u0105 odzyskiwa\u0107 \u201eod zera\u201d.<\/p>\n<h3><strong>Backup, kt\u00f3ry istnieje tylko w teorii<\/strong><\/h3>\n<p>Bardzo cz\u0119sto s\u0142yszymy: \u201ebackup jest, informatyk si\u0119 tym zajmowa\u0142\u201d. Dopiero po jego odej\u015bciu wychodzi, \u017ce:<\/p>\n<ul>\n<li>backup nie by\u0142 testowany,<\/li>\n<li>nie ma procedury odtworzenia,<\/li>\n<li>nie wiadomo, ile trwa przywr\u00f3cenie system\u00f3w.<\/li>\n<\/ul>\n<p>To moment, w kt\u00f3rym firma orientuje si\u0119, \u017ce nie ma realnego zabezpieczenia \u2013 tylko za\u0142o\u017cenie, \u017ce ono istnieje.<\/p>\n<h3><strong>Brak dokumentacji<\/strong><\/h3>\n<p>Kolejny problem to brak uporz\u0105dkowanej dokumentacji. Bez niej nowa osoba musi odtwarza\u0107 \u015brodowisko od podstaw, ka\u017cda zmiana wi\u0105\u017ce si\u0119 z ryzykiem, a czas reakcji na problemy znacz\u0105co si\u0119 wyd\u0142u\u017ca. W praktyce oznacza to spowolnienie ca\u0142ej organizacji.<\/p>\n<h3><strong>Ukryte rozwi\u0105zania, kt\u00f3re przestaj\u0105 dzia\u0142a\u0107<\/strong><\/h3>\n<p>W wielu firmach IT rozwija si\u0119 \u201eorganicznie\u201d: pojawiaj\u0105 si\u0119 skrypty, r\u0119czne obej\u015bcia, \u00a0niestandardowe konfiguracje. Dzia\u0142aj\u0105, dop\u00f3ki kto\u015b je rozumie. Gdy tej osoby nie ma, zaczynaj\u0105 si\u0119 problemy, cz\u0119sto w najmniej oczekiwanym momencie.<\/p>\n<h3><strong>Ryzyko bezpiecze\u0144stwa, kt\u00f3re zostaje po odej\u015bciu<\/strong><\/h3>\n<p>Jednym z mniej oczywistych, a jednocze\u015bnie najbardziej niedocenianych obszar\u00f3w jest bezpiecze\u0144stwo. Po odej\u015bciu informatyka bardzo cz\u0119sto:<\/p>\n<ul>\n<li>jego dost\u0119p nie jest od razu usuwany,<\/li>\n<li>has\u0142a nie s\u0105 zmieniane,<\/li>\n<li>nie ma pe\u0142nej wiedzy, kto i do czego mia\u0142 dost\u0119p.<\/li>\n<\/ul>\n<p>To nie musi automatycznie oznacza\u0107 \u017cadnego problemu, ale na pewno oznacza brak kontroli. A w bezpiecze\u0144stwie IT brak kontroli zawsze wi\u0105\u017ce si\u0119 z potencjalnym ryzykiem \u2013 niezale\u017cnie od intencji.<\/p>\n<p>Bezpiecze\u0144stwo IT nie powinno opiera\u0107 si\u0119 na za\u0142o\u017ceniu, \u017ce \u201enikt nic nie zrobi\u201d, tylko na pewno\u015bci, \u017ce ka\u017cdy dost\u0119p jest \u015bwiadomy, kontrolowany i w ka\u017cdej chwili mo\u017cliwy do odebrania. <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e687be3\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"2%\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row  top_margin_2pct bottom_margin_2pct\"  style=\"padding-top: calc(100vw * 0.02); padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Jak zabezpieczy\u0107 firm\u0119 przed tym scenariuszem<\/h2><div class=\"divider-wrap\" style=\"opacity: 0.15;\" data-alignment=\"default\"><div style=\"margin-top: 40px; width: 200px; height: 1px; margin-bottom: 40px;\" data-width=\"200px\" data-animate=\"\" data-animation-delay=\"\" data-color=\"black\" class=\"divider-small-border\"><\/div><\/div><div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-check\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"5px\" data-alignment=\"left\"> Najwa\u017cniejsze wnioski s\u0105 proste: problemem nie jest odej\u015bcie informatyka, tylko brak przygotowania firmy na tak\u0105 sytuacj\u0119. W praktyce oznacza to konieczno\u015b\u0107 uporz\u0105dkowania kilku kluczowych obszar\u00f3w.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Przede wszystkim wiedza o IT nie mo\u017ce by\u0107 \u201ew g\u0142owie\u201d. <strong>Ka\u017cdy istotny element \u015brodowiska \u2013 od dost\u0119pu do system\u00f3w po konfiguracj\u0119 backupu \u2013 powinien by\u0107 udokumentowany w spos\u00f3b, kt\u00f3ry pozwala innej osobie przej\u0105\u0107 jego obs\u0142ug\u0119 bez zgadywania.<\/strong><\/li>\n<li>R\u00f3wnie wa\u017cne jest <strong>uporz\u0105dkowanie dost\u0119pu<\/strong>. Firma powinna mie\u0107 pe\u0142n\u0105 kontrol\u0119 nad kontami administracyjnymi, uprawnieniami i has\u0142ami. Dost\u0119p nie mo\u017ce by\u0107 przypisany do jednej osoby \u2013 musi by\u0107 zarz\u0105dzany centralnie i mo\u017cliwy do szybkiego odebrania.<\/li>\n<li>Kolejnym elementem jest <strong>regularne testowanie odtworzenia danych<\/strong>. Sam fakt, \u017ce backup si\u0119 wykonuje, nie oznacza jeszcze bezpiecze\u0144stwa. Kluczowe jest to, czy w praktyce jeste\u015b w stanie przywr\u00f3ci\u0107 systemy w akceptowalnym czasie.<\/li>\n<li>Warto te\u017c \u015bwiadomie <strong>eliminowa\u0107 tzw. pojedyncze punkty awarii<\/strong> \u2013 sytuacje, w kt\u00f3rych jedna osoba, jedno rozwi\u0105zanie albo jeden system decyduje o ci\u0105g\u0142o\u015bci dzia\u0142ania firmy.<\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e688519\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"2%\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row  top_margin_2pct bottom_margin_2pct\"  style=\"padding-top: calc(100vw * 0.02); padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Outsourcing IT: koniec zale\u017cno\u015bci od jednej osoby<\/h2><div class=\"divider-wrap\" style=\"opacity: 0.15;\" data-alignment=\"default\"><div style=\"margin-top: 40px; width: 200px; height: 1px; margin-bottom: 40px;\" data-width=\"200px\" data-animate=\"\" data-animation-delay=\"\" data-color=\"black\" class=\"divider-small-border\"><\/div><\/div><div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-check\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"5px\" data-alignment=\"left\"> Z naszego do\u015bwiadczenia wynika, \u017ce najskuteczniejsze podej\u015bcie do IT to takie, w kt\u00f3rym nie zale\u017cy ono od jednej osoby, ale opiera si\u0119 na <strong>procesie, dokumentacji i zespole<\/strong>.<\/p>\n<p>Dobrze pouk\u0142adany model outsourcingowy zapewnia:<\/p>\n<ul>\n<li>dost\u0119p do wiedzy i dokumentacji niezale\u017cnie od konkretnego specjalisty,<\/li>\n<li>jasno zarz\u0105dzane uprawnienia,<\/li>\n<li>gotowe procedury dzia\u0142ania w sytuacjach awaryjnych.<\/li>\n<\/ul>\n<p>Dzi\u0119ki temu firma nie musi \u201eodtwarza\u0107 IT\u201d po zmianie osoby \u2013 tylko kontynuuje jego dzia\u0142anie bez przestoj\u00f3w. To nie jest kwestia \u201ezewn\u0119trznego informatyka\u201d, ale zmiany podej\u015bcia: z reaktywnego na zarz\u0105dcze.<\/p>\n<p>Ten temat szerzej opisali\u015bmy w artykule <a href=\"https:\/\/intelion.pl\/en\/outsourcing-it\/informatyk-na-etacie-vs-outsourcing-it\/\">\u201eInformatyk na etacie vs. outsourcing IT \u2013 o tym prawdopodobnie nie pomy\u015bla\u0142e\u015b\u201d<\/a><\/p>\n<p>Przeczytaj r\u00f3wnie\u017c: <a href=\"https:\/\/intelion.pl\/en\/outsourcing-it\/ile-kosztuje-outsourcing-it\/\">Ile kosztuje outsourcing IT? Cennik i przyk\u0142ady<\/a> <\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e688e7a\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"2%\" data-bottom-percent=\"2%\"  class=\"wpb_row vc_row-fluid vc_row  top_margin_2pct bottom_margin_2pct\"  style=\"padding-top: calc(100vw * 0.02); padding-bottom: calc(100vw * 0.02); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h2 style=\"text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Podsumowanie<\/h2><div class=\"divider-wrap\" style=\"opacity: 0.15;\" data-alignment=\"default\"><div style=\"margin-top: 40px; width: 200px; height: 1px; margin-bottom: 40px;\" data-width=\"200px\" data-animate=\"\" data-animation-delay=\"\" data-color=\"black\" class=\"divider-small-border\"><\/div><\/div>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Odej\u015bcie informatyka najcz\u0119\u015bciej jest momentem, kt\u00f3ry ujawnia, jak naprawd\u0119 wygl\u0105da IT w firmie. Je\u015bli dost\u0119p nie jest uporz\u0105dkowany, backup nie jest testowany, a wiedza jest w g\u0142owie jednej osoby, to firma dzia\u0142a na kredyt \u2013 do pierwszej krytycznej sytuacji.<\/p>\n<p>Dlatego najwa\u017cniejsze pytanie brzmi: Czy Twoja firma jest przygotowana na to, \u017ce IT nagle przestanie by\u0107 dost\u0119pne \u2013 cho\u0107by na jeden dzie\u0144?<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_6a0e65e68987c\"  data-br=\"10px\" data-br-applies=\"bg\" data-column-margin=\"default\" data-midnight=\"light\" data-top-percent=\"5%\" data-bottom-percent=\"5%\"  class=\"wpb_row vc_row-fluid vc_row full-width-section\"  style=\"padding-top: calc(100vw * 0.05); padding-bottom: calc(100vw * 0.05); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop using-bg-color\"  style=\"background-color: #08a5e0; \"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 light center\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col centered-text no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element  vc_custom_1774950818016\" style=\" max-width: 800px; display: inline-block;\">\n\t<div class=\"wpb_wrapper\">\n\t\t<p><strong>Porozmawiajmy o Twoim IT<\/strong><\/p>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"divider-wrap\" data-alignment=\"default\"><div style=\"height: 10px;\" class=\"divider\"><\/div><\/div><a class=\"nectar-button jumbo see-through extra-color-2 has-icon\"  role=\"button\" style=\"\"  href=\"https:\/\/intelion.pl\/en\/kontakt\/\" data-color-override=\"false\" data-hover-color-override=\"false\" data-hover-text-color-override=\"#fff\"><span>Napisz do nas<\/span><i  class=\"fa fa-envelope-open-o\"><\/i><\/a>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"W wielu firmach IT funkcjonuje w tle. Systemy s\u0105 dost\u0119pne,...","protected":false},"author":9,"featured_media":4682,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40],"tags":[],"class_list":{"0":"post-4675","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-zarzadzanie-infrastruktura-it"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Informatyk w firmie. Co si\u0119 stanie, gdy odejdzie?<\/title>\n<meta name=\"description\" content=\"Co je\u015bli Tw\u00f3j informatyk nagle odejdzie? Zobacz, jakie ryzyka gro\u017c\u0105 firmie i jak si\u0119 przed nimi zabezpieczy\u0107.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelion.pl\/en\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelion.pl\/en\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelion Informatycy do us\u0142ug\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/intelionbb\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/dawid.socha.54\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T10:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dawid Socha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dawid Socha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/\"},\"author\":{\"name\":\"Dawid Socha\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/#\\\/schema\\\/person\\\/5ca997b3c874a08586af3937247842d5\"},\"headline\":\"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie\",\"datePublished\":\"2026-03-31T10:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/\"},\"wordCount\":2670,\"publisher\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/close-up-man-writing-code-laptop-scaled.jpg\",\"articleSection\":[\"Zarz\u0105dzanie infrastruktur\u0105 IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/\",\"url\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/\",\"name\":\"Informatyk w firmie. Co si\u0119 stanie, gdy odejdzie?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/close-up-man-writing-code-laptop-scaled.jpg\",\"datePublished\":\"2026-03-31T10:30:10+00:00\",\"description\":\"Co je\u015bli Tw\u00f3j informatyk nagle odejdzie? Zobacz, jakie ryzyka gro\u017c\u0105 firmie i jak si\u0119 przed nimi zabezpieczy\u0107.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/close-up-man-writing-code-laptop-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/close-up-man-writing-code-laptop-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Man working on computer. Young it worker using laptop in the office, Internet marketing, technology, finance, business concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/zarzadzanie-infrastruktura-it\\\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/intelion.pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/#website\",\"url\":\"https:\\\/\\\/intelion.pl\\\/\",\"name\":\"Intelion Informatycy do us\u0142ug\",\"description\":\"INTELION Informatycy do us\u0142ug\",\"publisher\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/#organization\"},\"alternateName\":\"Intelion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/intelion.pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/#organization\",\"name\":\"INTELION Informatycy do us\u0142ug\",\"alternateName\":\"INTELION\",\"url\":\"https:\\\/\\\/intelion.pl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cropped-favicon.png\",\"contentUrl\":\"https:\\\/\\\/intelion.pl\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cropped-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"INTELION Informatycy do us\u0142ug\"},\"image\":{\"@id\":\"https:\\\/\\\/intelion.pl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/intelionbb\\\/\"],\"email\":\"kontakt@intelion.pl\",\"telephone\":\"+48338140538\",\"legalName\":\"INTELION s.c.\",\"foundingDate\":\"2005-10-01\",\"vatID\":\"9372464597\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/intelion.pl\\\/#\\\/schema\\\/person\\\/5ca997b3c874a08586af3937247842d5\",\"name\":\"Dawid Socha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g\",\"caption\":\"Dawid Socha\"},\"description\":\"Ekspert IT z ponad 25-letnim do\u015bwiadczeniem. Specjalizuje si\u0119 w rozwi\u0105zaniach Microsoft 365, Power Automate i SharePoint oraz automatyzacji proces\u00f3w biznesowych. Na bie\u017c\u0105co \u015bledzi rozw\u00f3j nowych technologii i pomaga firmom wykorzystywa\u0107 sztuczn\u0105 inteligencj\u0119 w praktyczny i uporz\u0105dkowany spos\u00f3b w codziennej pracy. Posiada certyfikat Microsoft Certified Professional. Prywatnie m\u0105\u017c, tata, motocyklista i fan siatk\u00f3wki. Jak m\u00f3wi, motocykl uczy pokory i skupienia, a siatk\u00f3wka przypomina, \u017ce nawet introwertycy potrzebuj\u0105 dru\u017cyny \u2013 w pracy stara si\u0119 \u0142\u0105czy\u0107 jedno z drugim.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dawid.socha.54\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/dawid-socha\\\/\"],\"knowsAbout\":[\"Microsoft 365\",\"Automatyzacje proces\u00f3w\"],\"jobTitle\":\"W\u0142a\u015bciciel firmy | Senior IT konsultant\",\"worksFor\":\"INTELION\",\"url\":\"https:\\\/\\\/intelion.pl\\\/en\\\/author\\\/dsocha\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Informatyk w firmie. Co si\u0119 stanie, gdy odejdzie?","description":"Co je\u015bli Tw\u00f3j informatyk nagle odejdzie? Zobacz, jakie ryzyka gro\u017c\u0105 firmie i jak si\u0119 przed nimi zabezpieczy\u0107.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelion.pl\/en\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/","og_locale":"en_US","og_type":"article","og_title":"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie","og_url":"https:\/\/intelion.pl\/en\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/","og_site_name":"Intelion Informatycy do us\u0142ug","article_publisher":"https:\/\/www.facebook.com\/intelionbb\/","article_author":"https:\/\/www.facebook.com\/dawid.socha.54","article_published_time":"2026-03-31T10:30:10+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg","type":"image\/jpeg"}],"author":"Dawid Socha","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dawid Socha","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#article","isPartOf":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/"},"author":{"name":"Dawid Socha","@id":"https:\/\/intelion.pl\/#\/schema\/person\/5ca997b3c874a08586af3937247842d5"},"headline":"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie","datePublished":"2026-03-31T10:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/"},"wordCount":2670,"publisher":{"@id":"https:\/\/intelion.pl\/#organization"},"image":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#primaryimage"},"thumbnailUrl":"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg","articleSection":["Zarz\u0105dzanie infrastruktur\u0105 IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/","url":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/","name":"Informatyk w firmie. Co si\u0119 stanie, gdy odejdzie?","isPartOf":{"@id":"https:\/\/intelion.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#primaryimage"},"image":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#primaryimage"},"thumbnailUrl":"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg","datePublished":"2026-03-31T10:30:10+00:00","description":"Co je\u015bli Tw\u00f3j informatyk nagle odejdzie? Zobacz, jakie ryzyka gro\u017c\u0105 firmie i jak si\u0119 przed nimi zabezpieczy\u0107.","breadcrumb":{"@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#primaryimage","url":"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg","contentUrl":"https:\/\/intelion.pl\/wp-content\/uploads\/2026\/03\/close-up-man-writing-code-laptop-scaled.jpg","width":2560,"height":1707,"caption":"Man working on computer. Young it worker using laptop in the office, Internet marketing, technology, finance, business concept"},{"@type":"BreadcrumbList","@id":"https:\/\/intelion.pl\/zarzadzanie-infrastruktura-it\/co-sie-stanie-gdy-informatyk-odejdzie-realne-ryzyka-w-firmie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/intelion.pl\/"},{"@type":"ListItem","position":2,"name":"Co si\u0119 stanie, gdy informatyk odejdzie? Realne ryzyka w firmie"}]},{"@type":"WebSite","@id":"https:\/\/intelion.pl\/#website","url":"https:\/\/intelion.pl\/","name":"Intelion Informatycy do us\u0142ug","description":"INTELION Informatycy do us\u0142ug","publisher":{"@id":"https:\/\/intelion.pl\/#organization"},"alternateName":"Intelion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelion.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelion.pl\/#organization","name":"INTELION Informatycy do us\u0142ug","alternateName":"INTELION","url":"https:\/\/intelion.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelion.pl\/#\/schema\/logo\/image\/","url":"https:\/\/intelion.pl\/wp-content\/uploads\/2019\/12\/cropped-favicon.png","contentUrl":"https:\/\/intelion.pl\/wp-content\/uploads\/2019\/12\/cropped-favicon.png","width":512,"height":512,"caption":"INTELION Informatycy do us\u0142ug"},"image":{"@id":"https:\/\/intelion.pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/intelionbb\/"],"email":"kontakt@intelion.pl","telephone":"+48338140538","legalName":"INTELION s.c.","foundingDate":"2005-10-01","vatID":"9372464597","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/intelion.pl\/#\/schema\/person\/5ca997b3c874a08586af3937247842d5","name":"Dawid Socha","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/95262ed844a61cf3f0473305c5f381192358ec5c679e3b07678d1f4068f48d13?s=96&d=mm&r=g","caption":"Dawid Socha"},"description":"Ekspert IT z ponad 25-letnim do\u015bwiadczeniem. Specjalizuje si\u0119 w rozwi\u0105zaniach Microsoft 365, Power Automate i SharePoint oraz automatyzacji proces\u00f3w biznesowych. Na bie\u017c\u0105co \u015bledzi rozw\u00f3j nowych technologii i pomaga firmom wykorzystywa\u0107 sztuczn\u0105 inteligencj\u0119 w praktyczny i uporz\u0105dkowany spos\u00f3b w codziennej pracy. Posiada certyfikat Microsoft Certified Professional. Prywatnie m\u0105\u017c, tata, motocyklista i fan siatk\u00f3wki. Jak m\u00f3wi, motocykl uczy pokory i skupienia, a siatk\u00f3wka przypomina, \u017ce nawet introwertycy potrzebuj\u0105 dru\u017cyny \u2013 w pracy stara si\u0119 \u0142\u0105czy\u0107 jedno z drugim.","sameAs":["https:\/\/www.facebook.com\/dawid.socha.54","https:\/\/www.linkedin.com\/in\/dawid-socha\/"],"knowsAbout":["Microsoft 365","Automatyzacje proces\u00f3w"],"jobTitle":"W\u0142a\u015bciciel firmy | Senior IT konsultant","worksFor":"INTELION","url":"https:\/\/intelion.pl\/en\/author\/dsocha\/"}]}},"_links":{"self":[{"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/posts\/4675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/comments?post=4675"}],"version-history":[{"count":6,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/posts\/4675\/revisions"}],"predecessor-version":[{"id":4681,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/posts\/4675\/revisions\/4681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/media\/4682"}],"wp:attachment":[{"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/media?parent=4675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/categories?post=4675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelion.pl\/en\/wp-json\/wp\/v2\/tags?post=4675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}