none none none none none
none none none none none
This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Enable selected Enable all

it-security

Blogs

Bezpečnosť vs informácie
Bezpečnosť vs ja ju nepotrebujem
Bezpečnosť vs ja tomu nerozumiem
Dnešná každodenná téma - 01
Dnešná každodenná téma - 02
Dnešná každodenná téma - 03
Dnešná každodenná téma - 04
none
it-portal.sk ZAČÍNAME
none
Kyberbezpečnosť je téma stále a nikdy neskončí.
none
Linkedin 2021
none
Plán kontinuity podnikania
Proti nekalým praktikám nasadíme technológie
THREAT INTELLIGENCE REPORT 30. októbra 2023

Programovanie

01. O programovaní

Video

none
Bezpečné heslo

Videá

none
... Podvodníci, kteří se vydávají za Policii
none
... Zastavil jsem podvody z Kolumbie
Reportéři ČT: Zloději on-line

enisa

none
... ak je to veľmi výhodná ponuka
none
... ak niekto nalieha na vaše rýchle rozhodnutie
none
Certification Key actors and their role
none
Cyber Safety At Home - GoldPhish
none
ENISA
none
European Cybersecurity Skills Framework (ECSF) - Introduction
none300,000 new instances of malware are generated daily
noneIt takes 49 days on average to detect malware
none52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
none57% of organizations expect to change their primary backup solution in 2023
none70% of boards in 2026 will have a member responsible for cyber security
none74% of organizations will use cloud services for data protection by 2025
none79% of organizations have a security gap
none80% of organizations will use BaaS/DRaaS for at least some of their servers
none80% of workers need up to 8 searches to find the document they need for work
none85% of organizations had at least one ransomware attack in the past year
none8 percent increase in global cyberattacks per week
none92% of malware is distributed via email
none95% of cyber problems are caused by user behavior itself
noneAtlassian releases critical software patches
noneChrome 120 fixes 10 vulnerabilities
noneHackers claim to have accessed medical data of the Israeli Defense Forces
noneJapan's space program at risk after Microsoft Active Directory breach
noneCybercriminals are selling access to Chinese surveillance cameras
noneNissan is investigating the cyber attack and potential data breach
none87% increase in IoT malware in 2022 compared to 2021
noneData leak from the mujRozhlas audio portal
noneMore than 20,000 MS Exchange servers are exposed to attacks
noneAdministrative security
noneAcceptable risk
noneActive safety
noneActive digital footprint
noneIS risk analysis
noneRisk analysis
noneRisk analysis - copy
noneCookies
noneData center
noneDDoS (Distributed Denial of Service)
noneDigital footprint
noneDoS (Denial of Service)
noneAvailability
noneSIEM functionalities
nonePhysical and object security
noneAssessment of the severity of impacts
noneHosting
noneThreats and challenges in 2024
noneHUB
noneIdentification of vulnerabilities
noneISMS (Information Security Management System)
noneISO 27001 - Security of Information Technologies
noneKeylogger
noneCyber ​​security
noneCyber ​​safe
noneMalware
noneExtremely high risk
noneMinimum successful backup strategy
noneZero trust model
noneZero trust model
noneModel of zero trust - the employee needs
noneImmutable data
noneDisaster recovery
nonePassive digital footprint
nonePenetration test
nonePenetration tests
nonePersonal security
nonePhishing
noneBusiness continuity plan - Main components
noneDisaster recovery plan - Key areas
noneA network disaster recovery plan includes the following
noneFake phone number
noneFire safety of buildings (PBS)
noneThe probability of fulfilling the risk scenario
noneIndustrial safety
noneRansomware
noneScareware
noneSIEM
noneSLA (Service Level Agreement)
noneSocial Engineering
noneSpear phishing
noneSpoofing
noneDisaster recovery strategy
noneVulnerability test
noneTypes of incidents
noneWeb hosting
noneBackup - Strategy 3-2-1
noneBackup - Strategy 3-2-1-1-0
noneMidfield - Strategy 4-3-2
noneSeverity of risks
noneThe lifecycle of a malicious attack
noneVulnerability
noneNIS2
noneNIS2 - Basic subjects - Essential
noneNIS2 - Important subjects - Important
noneNIS2 - Who falls within the framework
noneNIS2 - Supply Chain Security Review
none01. O programovaní
noneBezpečnosť vs informácie
noneBezpečnosť vs ja ju nepotrebujem
noneBezpečnosť vs ja tomu nerozumiem
noneDnešná každodenná téma - 01
noneDnešná každodenná téma - 02
noneDnešná každodenná téma - 03
noneDnešná každodenná téma - 04
noneKyberbezpečnosť je téma stále a nikdy neskončí.
noneLinkedin 2021
nonePlán kontinuity podnikania
noneProti nekalým praktikám nasadíme technológie
noneTHREAT INTELLIGENCE REPORT 30. októbra 2023
none

What is what in IT

67
none

Recomendations

23
none

Institutions

9
none

Legislative

14
none

Norms

25
none

Infographics

6
none

Events

1
Contact us by e-mail
Copyright © 2019 - 2024
Cookies | Privacy policy | Terms of use