This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Valí sa na nás lavína podvodných mailov a telefonátov. Zvládame to?
https://hnonline.sk/hn-special/96233166-vali-sa-na-nas-lavina-podvodnych-mailov-a-telefonatov-zvladame-to
Source: HN špeciál
Previous
20 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
Report an incident
show link
CheckPoint Research
show link
show all
What is what in IT
66
Identification of vulnerabilities
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
Acceptable risk
is a risk that a person is willing to accept, or admit, undergo
show all
Interesting
22
79% of organizations have a security gap
Source: Internet
95% of cyber problems are caused by user behavior itself
show link
Source: CheckPointResearch
show all
Recomendations
377
Risk Management
Implement a risk approval process
Source: it.portal
Critical thinking
Show examples of strong passwords
Source: it.portal
show all
Institutions
51
Zakonyprolidi
Sbírka zákonů ČR
show link
NCKB
National Cyber Security Center
show link
show all
Legislative
82
45/2011 Z. z.
Zákon o kritickej infraštruktúre
show link
Source: Slov-Lex
436/2019 Z. z.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti a znalostnom štandarde audítora
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
ISO/IEC 27010:2015
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
Technologies
14
Synology
show link
CISCO
show all
Infographics
7
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Čas na realitu: Ako sme na tom s kyberbezpečnosťou?
show link
Source: HN špeciál
Kým sa tam vyberiete. Ako posúdiť bezpečnosť cloudu
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use