Recomendations
 |
Secure digital identity of the employee using the card and its options
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific security policies ▪ the card/token is a certified qualified means (QSCD) ▪ qualified electronic signature according to eIDAS ▪ qualified electronic seal according to eIDAS and more
Source: it.portal
|
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... viac...
Source: it.portal
we have a Firewall so I am safe from attacks
Source: it-portal.sk
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
|
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
|
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
|
|
 Actual incidents
|
6 |
is the organization's ability to react and recover from an event that negatively affected the company's operations
is information in the database that cannot or should not be deleted or modified.
Source: it.portal
show all
 Interesting
|
22 |
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
show all
 Recomendations
|
23 |
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Source: it.portal
we have a Firewall so I am safe from attacks
Source: it-portal.sk
show all
 Institutions
|
9 |
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
9 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|