|
Bezpečnosť vs ja ju nepotrebujem |
|
|
Bezpečnosť vs ja tomu nerozumiem |
|
|
Dnešná každodenná téma - 01 |
|
|
Dnešná každodenná téma - 02 |
|
|
Dnešná každodenná téma - 03 |
|
|
Dnešná každodenná téma - 04 |
|
 |
it-portal.sk ZAČÍNAME |
|
 |
Kyberbezpečnosť je téma stále a nikdy neskončí. |
|
 |
Linkedin 2021 |
|
 |
Plán kontinuity podnikania |
|
|
Proti nekalým praktikám nasadíme technológie |
|
|
THREAT INTELLIGENCE REPORT 30. októbra 2023 |
|
 |
Bezpečné heslo |
|
 |
... Podvodníci, kteří se vydávají za Policii |
|
 |
... Zastavil jsem podvody z Kolumbie |
|
|
Reportéři ČT: Zloději on-line |
|
 |
... ak je to veľmi výhodná ponuka |
|
 |
... ak niekto nalieha na vaše rýchle rozhodnutie |
|
 |
Certification Key actors and their role |
|
 |
Cyber Safety At Home - GoldPhish |
|
 |
ENISA |
|
 |
European Cybersecurity Skills Framework (ECSF) - Introduction |
|
300,000 new instances of malware are generated daily
|
It takes 49 days on average to detect malware
|
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
|
57% of organizations expect to change their primary backup solution in 2023
|
70% of boards in 2026 will have a member responsible for cyber security
|
74% of organizations will use cloud services for data protection by 2025
|
79% of organizations have a security gap
|
80% of organizations will use BaaS/DRaaS for at least some of their servers
|
80% of workers need up to 8 searches to find the document they need for work
|
85% of organizations had at least one ransomware attack in the past year
|
8 percent increase in global cyberattacks per week
|
92% of malware is distributed via email
|
95% of cyber problems are caused by user behavior itself
|
Atlassian releases critical software patches
|
Chrome 120 fixes 10 vulnerabilities
|
Hackers claim to have accessed medical data of the Israeli Defense Forces
|
Japan's space program at risk after Microsoft Active Directory breach
|
Cybercriminals are selling access to Chinese surveillance cameras
|
Nissan is investigating the cyber attack and potential data breach
|
87% increase in IoT malware in 2022 compared to 2021
|
Data leak from the mujRozhlas audio portal
|
More than 20,000 MS Exchange servers are exposed to attacks
|
|
Administrative security
|
Acceptable risk
|
Active safety
|
Active digital footprint
|
IS risk analysis
|
Risk analysis
|
Risk analysis - copy
|
Cookies
|
Data center
|
DDoS (Distributed Denial of Service)
|
Digital footprint
|
DoS (Denial of Service)
|
Availability
|
SIEM functionalities
|
Physical and object security
|
Assessment of the severity of impacts
|
Hosting
|
Threats and challenges in 2024
|
HUB
|
Identification of vulnerabilities
|
ISMS (Information Security Management System)
|
ISO 27001 - Security of Information Technologies
|
Keylogger
|
Cyber security
|
Cyber safe
|
Malware
|
Extremely high risk
|
Minimum successful backup strategy
|
Zero trust model
|
Zero trust model
|
Model of zero trust - the employee needs
|
Immutable data
|
Disaster recovery
|
Passive digital footprint
|
Penetration test
|
Penetration tests
|
Personal security
|
Phishing
|
Business continuity plan - Main components
|
Disaster recovery plan - Key areas
|
A network disaster recovery plan includes the following
|
Fake phone number
|
Fire safety of buildings (PBS)
|
The probability of fulfilling the risk scenario
|
Industrial safety
|
Ransomware
|
Scareware
|
SIEM
|
SLA (Service Level Agreement)
|
Social Engineering
|
Spear phishing
|
Spoofing
|
Disaster recovery strategy
|
Vulnerability test
|
Types of incidents
|
Web hosting
|
Backup - Strategy 3-2-1
|
Backup - Strategy 3-2-1-1-0
|
Midfield - Strategy 4-3-2
|
Severity of risks
|
The lifecycle of a malicious attack
|
Vulnerability
|
NIS2
|
NIS2 - Basic subjects - Essential
|
NIS2 - Important subjects - Important
|
NIS2 - Who falls within the framework
|
NIS2 - Supply Chain Security Review
|
|
01. O programovaní
|
Bezpečnosť vs informácie
|
Bezpečnosť vs ja ju nepotrebujem
|
Bezpečnosť vs ja tomu nerozumiem
|
Dnešná každodenná téma - 01
|
Dnešná každodenná téma - 02
|
Dnešná každodenná téma - 03
|
Dnešná každodenná téma - 04
|
Kyberbezpečnosť je téma stále a nikdy neskončí.
|
Linkedin 2021
|
Plán kontinuity podnikania
|
Proti nekalým praktikám nasadíme technológie
|
THREAT INTELLIGENCE REPORT 30. októbra 2023
|
|
|
|
 Actual incidents
|
6 |
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
• Survey • Initial access • Startup • Credential access and privilege escalation • Lateral movement • Collection and exfiltration • Installation o... viac...
Source: it.portal
show all
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
show all
 Recomendations
|
23 |
 Institutions
|
9 |
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
 Legislative
|
14 |
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
8 |
Contact us by e-mail
|