This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Online Threats
Explain risks and reporting suspicious calls
Source: it.portal
Previous
14 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CERT-EU Threat intelligence
show link
Report an incident
show link
show all
What is what in IT
66
Identification of vulnerabilities
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
Types of incidents
• Unsolicited content
• Malicious code
• Obtaining information
• Intrusion attempt
• Penetration
• Unavailability
• Risk of information security
more...
show all
Interesting
22
8 percent increase in global cyberattacks per week
show link
Source: CheckPointResearch
80% of workers need up to 8 searches to find the document they need for work
Source: archbee
show all
Recomendations
377
Incident Management
Schedule exercises at least once a year
Source: it.portal
Supplier Responsibility
Establish clear team responsibilities.
Source: it.portal
show all
Institutions
51
NCC-ES
National Cybersecurity Institute (INCIBE)
show link
NCKB
National Cyber Security Center
show link
show all
Legislative
82
453/2007 Z. z.
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti
show link
Source: Slov-Lex
336/2004 Z. z.
Vyhláška Národného bezpečnostného úradu o fyzickej bezpečnosti a objektovej bezpečnosti
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC FDIS 27011
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
ISO/IEC 27003:2017
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
show all
Technologies
14
Dell
show link
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
show all
Infographics
7
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
show all
Events
0
Certifications
0
Acreditations
0
Media
436
81. Hacking a kybernetická bezpečnost - Honeypot
show link
Source: David Šetek - Hackni svou budoucnost
Bezpečnosť 2.0. Problémom sú ľudia
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use