Interesting
 |
92% of malware is distributed via email
Source: Internet
|
|
|
Source: CheckPoint Research
|
|
|
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
• high • medium • low • very low
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Review and update documentation according to law.
Source: it.portal
Implement least privilege + monitoring
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovuje obsah bezpečnostných opatrení, obsah a štruktúra bezpečnostnej dokumentácie a rozsah všeobecných bezpečnostn... more...
show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
Source: TEST prenosu na LOCAL
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|