This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Mobile Devices
Implement cloud or external backup
Source: it.portal
Previous
13 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CERT-EU Threat intelligence
show link
NÚKIB - Threats and vulnerabilities
show link
show all
What is what in IT
66
Assessment of the severity of impacts
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
Midfield - Strategy 4-3-2
• 4 Copies
• 3 Locations
• 2 Off-site locations
Source: it.portal
show all
Interesting
22
300,000 new instances of malware are generated daily
Source: Internet
95% of cyber problems are caused by user behavior itself
show link
Source: CheckPointResearch
show all
Recomendations
377
Online Threats
Recommend not to open attachments from strangers
Source: it.portal
Training and Awareness
Implement regular tests
Source: it.portal
show all
Institutions
51
Office for Standardization, Metrology and Testing of the Slovak Republic
Standards portal
show link
NUKIB
National Office for Cyber and Information Security
show link
show all
Legislative
82
367/2024 Z. z.
Zákon o kritickej infraštruktúre a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
249/2011 Z. z.
Zákon o riadení bezpečnosti pozemných komunikácií a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27013:2021
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
show all
Technologies
14
Ubiquiti
show link
ESET
show link
show all
Infographics
7
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
show all
Events
0
Certifications
0
Acreditations
0
Media
436
41. Hacking a kybernetická bezpečnost - Hydra a prolamování hesel - formulář v HTML, tvorba příkazu
show link
Source: David Šetek - Hackni svou budoucnost
Mastering Step Four of Zero Trust: Policy Creation
show link
Source: Threat Talks
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use