Recomendations
 |
Incident Management
Implement a simple reporting procedure
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... more...
serves to assess the level of security by simulating situations that would be used by an attacker
show all
 Interesting
|
22 |
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... more...
show all
 Recomendations
|
377 |
Implement regular access reviews.
Source: it.portal
Evaluate secondary location or cloud.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o informačných technológiách vo verejnej správe a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
226 VYHLÁŠKA Národného bezpečnostného úradu z 26. augusta 2025, ktorou sa ustanovujú podrobnosti o hláseniach show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|