This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Supplier responsibility
Develop an exit plan and data protection.
Source: it.portal
Previous
11 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
SK-CERT Safety warnings
show link
CISA - CYBER INCIDENTS
show link
show all
What is what in IT
66
A network disaster recovery plan includes the following
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
Social Engineering
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Interesting
22
It takes 49 days on average to detect malware
Source: Internet
Chrome 120 fixes 10 vulnerabilities
Google v utorok oznámil vydanie prehliadača Chrome 120 s opravami 10-tich zraniteľností.
06. 12. 2023
show all
Recomendations
377
Online Threats
Recommend a password manager or encrypted storage
Source: it.portal
Online threats
Use only verified devices or USB
Source: it.portal
show all
Institutions
51
NCC-HR
Croatian Academic and Research Network – CARNET (NCC-HR)
show link
CSIRT
Národné centrum kybernetickej bezpečnosti
show link
show all
Legislative
82
316/2021 Sb.
Vyhláška o některých požadavcích pro zápis do katalogu cloud computingu
show link
Source: e-sbirka
281/2023 Z. z.
Zákon o všeobecnej bezpečnosti výrobkov a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC DIS 27006-2
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Technologies
14
WireGuard
show link
Ubiquiti
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Certified data centers in Slovakia and the surrounding area (14) according to the Uptime Institute
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Multifkatorová autentizace | Kybernetická bezpečnost
show link
Source: Školství v Královéhradeckém kraji
portál www.virtualsan.sk - zabezpecenie dat v datovych centrach s VMware HCI
show link
Source: DataTrend Servise
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use