This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Interesting
It takes 49 days on average to detect malware
Source: Internet
1 / 3
Next
300,000 new instances of malware are generated daily
Source: Internet
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
Source: CheckPoint Research
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
74% of organizations will use cloud services for data protection by 2025
Source: Veeam
79% of organizations have a security gap
Source: Internet
8 percent increase in global cyberattacks per week
show link
Source: CheckPointResearch
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
80% of workers need up to 8 searches to find the document they need for work
Source: archbee
Actual incidents
6
CISA - CYBER INCIDENTS
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
67
Midfield - Strategy 4-3-2
• 4 Copies
• 3 Locations
• 2 Off-site locations
Source: it.portal
DDoS (Distributed Denial of Service)
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
show all
Interesting
22
80% of workers need up to 8 searches to find the document they need for work
Source: archbee
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
show all
Recomendations
23
MYTH about cyber security - 01.
we have a Firewall so I am safe from attacks
Source: it-portal.sk
Security is also about adequate funding
show all
Institutions
9
NUKIB
National Office for Cyber and Information Security
show link
SK-CERT
National Cyber Security Center
show link
show all
Legislative
16
351/2011 Coll.
Zákon o elektronických komunikáciách
show link
231/2022 Coll.
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov
show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
Norms
25
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
ISO/IEC 27017:2015
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Technologies
14
WOW
show link
Ubiquiti
show link
show all
Infographics
9
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
40
So training or incident?
show link
Source: HN špeciál
Consulting: Current legislative changes in information and cyber security
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use