Recomendations
 |
PROTECT PERSONAL DATA - 09. Do not install unnecessary things
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remove unnecessary applications. At the same time, the only safe way to get apps is to download them directly from the official store (Google Play, Apple App Store, etc.). Think about what data and consents you provide when confirming the software license.
Source: KCCKB
|
Teach when to ignore and report fraud
Source: it.portal
Explain risks and caution
Source: it.portal
Teach to report and block content
Source: it.portal
|
Recommend strong passwords and MFA
Source: it.portal
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... more...
Source: it.portal
Implement backup recovery at regular intervals.
Source: it.portal
|
Develop manuals and training.
Source: it.portal
Consider SLAs in recovery plans.
Source: it.portal
Inventory critical processes and dependencies.
Source: it.portal
Develop incident scenarios and procedures.
Source: it.portal
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... more...
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... more...
show all
 Interesting
|
22 |
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
show all
 Recomendations
|
377 |
Develop and approve a security strategy at the management level
Source: it.portal
Implement modern authentication methods
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
Zákon, ktorým sa mení a dopĺňa zákon č. 272/2016 Z. z. o dôveryhodných službách pre elektronické transakcie na vnútornom trhu a o zmene a doplnení niektorých zákonov (zák... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
Source: TEST prenosu na LOCAL
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|