Recomendations
 |
Strengthen your cyber resistance - solve
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation and compliance
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a type of malware that locks up a computer system, or encrypts the data stored on it, and then demands a ransom to regain access
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
show all
 Interesting
|
22 |
 Recomendations
|
23 |
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
we have a Firewall so I am safe from attacks
Source: it-portal.sk
show all
 Institutions
|
9 |
 Legislative
|
14 |
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
116 |
Contact us by e-mail
|