Recomendations
 |
Reporting
Implement regular sharing of results
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... more...
is malicious software that includes all kinds of the most well-known forms, such as Trojan horses, ransomware, viruses, worms, etc.
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Implement regular sharing of results
Source: it.portal
Establish contact persons and reporting procedures.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa mení vyhláška Národného bezpečnostného úradu č. 336/2004 Z. z. o fyzickej bezpečnosti a objektovej bezpečnosti v znení ... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology. Security techniques. Information security management systems. Overview and vocabulary show link
Source: STN
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|