Recomendations
 |
Online Threats
Recommend encryption and a strong password
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is the organization's ability to react and recover from an event that negatively affected the company's operations
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
show all
 Recomendations
|
377 |
Implement supplier due diligence and monitoring
Source: it.portal
Implement regular checks
Source: it.portal
show all
 Institutions
|
51 |
Eyvor, National Coordination Centre for Cybersecurity - The Electronic Communications Office of Iceland (ECOI) show link
Office of the Government of the Republic of Slovenia for Information Security show link
show all
 Legislative
|
82 |
Zákon o všeobecnej bezpečnosti výrobkov a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|