What is what in IT
 |
Minimum successful backup strategy
• Have multiple copies of data - at least 3 • Saving copies of data in geographically different locations • Have at least one copy immediately available for quick recovery
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is malicious software that includes all kinds of the most well-known forms, such as Trojan horses, ransomware, viruses, worms, etc.
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
National Office for Cyber and Information Security show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti show link
show all
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|