Recomendations
 |
Risk management
Ensure agreements on outage support.
Source: it.portal
|
Teach when to ignore and report fraud
Source: it.portal
Explain risks and caution
Source: it.portal
Teach to report and block content
Source: it.portal
|
Recommend strong passwords and MFA
Source: it.portal
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... more...
Source: it.portal
Implement backup recovery at regular intervals.
Source: it.portal
|
Develop manuals and training.
Source: it.portal
Consider SLAs in recovery plans.
Source: it.portal
Inventory critical processes and dependencies.
Source: it.portal
Develop incident scenarios and procedures.
Source: it.portal
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
 Interesting
|
22 |
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... more...
show all
 Recomendations
|
377 |
Ensure agreements on outage support.
Source: it.portal
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
 Institutions
|
51 |
Office of the Government of the Republic of Slovenia for Information Security show link
National Cybersecurity Coordination Centre Unit in the Chancellery of the Prime Minister show link
show all
 Legislative
|
82 |
ZÁKON ze dne 15. září 2021, kterým se mění zákon č. 127/2005 Sb., o elektronických komunikacích a o změně některých souvisejících zákonů (zákon o elektronických komunikac... more...
show link
Source: e-sbirka
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 634/2005 Z. z., ktorou sa vykonávajú niekt... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|