Recomendations
 |
Organizational Security
Perform a complete risk analysis.
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
je pokus o podvodné získanie citlivých informácií, ako sú heslá, údaje o kreditných kartách, vydávaním sa za dôveryhodnú osobu alebo inštitúciu pri elektronickej komuniká... more...
serves to assess the level of security by simulating situations that would be used by an attacker
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
show all
 Recomendations
|
377 |
Explain which information is sensitive
Source: it.portal
Implement segmentation of critical systems.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
Zákon, ktorým sa mení a dopĺňa zákon č. 473/2005 Z. z. o poskytovaní služieb v oblasti súkromnej bezpečnosti a o zmene a doplnení niektorých zákonov (zákon o súkromnej be... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|