What is what in IT
 |
Fake phone number
a call from a spoofed phone number looks like your bank number. The caller introduces himself as an employee of the bank and, under the pretext of checking a suspicious payment, granting a loan or other fact, tries to lure out sensitive data, e.g. payment card data, login data for electronic banking or codes from SMS messages. The goal of fraudsters is to use these data to transfer money from your account to their own, or to make a purchase on the Internet using the data for your account or card.
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a risk directly affecting the provision of a service, a main process, a system or an organization. There is a risk of financial loss, damage to property, threat to hea... viac...
Source: it.portal
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
 Interesting
|
22 |
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
 Recomendations
|
23 |
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
▪ strong two-factor authentication ▪ electronic signature ▪ safe storage of cryptographic keys ▪ storage of third-party certificates ▪ setting specific se... viac...
Source: it.portal
show all
 Institutions
|
9 |
 Legislative
|
14 |
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
show all
 Norms
|
25 |
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
116 |
Contact us by e-mail
|