This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Reporting and Documentation
Create a central supplier register.
Source: it.portal
Previous
4 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
Midfield - Strategy 4-3-2
• 4 Copies
• 3 Locations
• 2 Off-site locations
Source: it.portal
Social Engineering
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Interesting
22
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
It takes 49 days on average to detect malware
Source: Internet
show all
Recomendations
377
PROTECT PERSONAL DATA - 03. Delete old conversations
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
Training and Awareness
Launch regular awareness campaigns
Source: it.portal
show all
Institutions
51
NCKB
National Cyber Security Center
show link
NCC-LV
Ministry of Defence
show link
show all
Legislative
82
227 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025 o bezpečnostných opatreniach
227 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025 o bezpečnostných opatreniach
show link
Source: Slov-Lex
492/2022 Z. z.
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
ISO/IEC 27014:2020
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
Technologies
14
Supermicro
show link
Documentary
nástroj na evidenciu štrukturovaných informácií...
show link
show all
Infographics
7
10 biggest threats for 2030
Source: ENISA
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
69. Hacking a kybernetická bezpečnost - Co umožňuje HTML injection a jak se proti němu chránit
show link
Source: David Šetek - Hackni svou budoucnost
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast
show link
Source: Threat Talks
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use