Interesting
 |
95% of cyber problems are caused by user behavior itself
Source: CheckPointResearch
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a set of policies and procedures for the systematic management of an organization's sensitive data
serves to assess the level of security by simulating situations that would be used by an attacker
show all
 Interesting
|
22 |
 Recomendations
|
23 |
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
 Institutions
|
9 |
 Legislative
|
14 |
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
116 |
Contact us by e-mail
|