This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Safety is also the regular education of every employee
Previous
16 / 4
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CISA - CYBER INCIDENTS
show link
CheckPoint Research
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
The probability of fulfilling the risk scenario
• high
• medium
• low
• very low
Source: it.portal
show all
Interesting
22
79% of organizations have a security gap
Source: Internet
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
Source: CheckPoint Research
show all
Recomendations
23
PROTECT PERSONAL DATA - 07. Do not believe urgent news
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
Secure digital identity of the employee using the card and its options
▪ strong two-factor authentication
▪ electronic signature
▪ safe storage of cryptographic keys
▪ storage of third-party certificates
▪ setting specific se...
viac...
Source: it.portal
show all
Institutions
9
GOV CERT SK
A specialized center designed primarily to increase the cyber security of the GOVNET network.
show link
NIST
National Institute of Standards and Technology
show link
show all
Legislative
14
134/2016 Z. z.
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: SLEX
493/2022 Coll.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti
show link
show all
Norms
25
ISO/IEC 27013:2021
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
ISO/IEC TS 27006-2:2021
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
Technologies
14
Ubiquiti
show link
Supermicro
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
116
Phishing is just the elementary school of cyberattacks. What does the medium and high one look like?
show link
Source: HN špeciál
Kyberpoistenie? Mohol by to byť biznis snov
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use