This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Reporting and Documentation
Implement a process for documenting new processes.
Source: it.portal
Previous
17 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
Risk analysis
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
show all
Interesting
22
80% of workers need up to 8 searches to find the document they need for work
Source: archbee
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
show all
Recomendations
377
Training and Awareness
Provide advanced training
Source: it.portal
Mobile devices
Recommend secure connection via VPN
Source: it.portal
show all
Institutions
51
NCC-BG
Ministry of Electronic Governance MEG Bulgaria
show link
NCC-BE
National Cybersecurity Coordination Centre Belgium
show link
show all
Legislative
82
124/2006 Z. z.
Zákon o bezpečnosti a ochrane zdravia pri práci a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
181/2014 Sb.
Zákon o kybernetické bezpečnosti
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
show all
Technologies
14
Ubiquiti
show link
CISCO
show all
Infographics
7
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
9. Hacking pro začátečníky - soukromé a veřejné IP adresy
show link
Source: David Šetek - Hackni svou budoucnost
FortiOS SSLVPN buffer overflow vulnerability - Threat Talks Cybersecurity Podcast
show link
Source: Threat Talks
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use