This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Recomendations
Incident Management
Request their development and approval
Source: it.portal
Previous
5 / 38
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
Report an incident
show link
CheckPoint Research
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
Assessment of the severity of impacts
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
show all
Interesting
22
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
57% of organizations expect to change their primary backup solution in 2023
Source: Veeam
show all
Recomendations
377
Incident management
Provide training and simulations.
Source: it.portal
Passwords
Explain the principle of a strong password and introduce its use
Source: it.portal
show all
Institutions
51
NCC-DE
National Coordination Centre for Cybersecurity (NCC-DE)
show link
Národný bezpečnostný úrad
show link
show all
Legislative
82
134/2016 Z. z.
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: Slov-Lex
45/2011 Z. z.
Zákon o kritickej infraštruktúre
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
Technologies
14
Mikrotik
show link
Supermicro
show link
show all
Infographics
7
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
10 biggest threats for 2030
Source: ENISA
show all
Events
0
Certifications
0
Acreditations
0
Media
436
60. Hacking a kybernetická bezpečnost - Burp suite - vypnutí a zapnutí Burp Suitu
show link
Source: David Šetek - Hackni svou budoucnost
14. Hacking a kybernetická bezpečnost - příkaz tree
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use