none none none none none
none none none none none
This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Enable selected Enable all

it-security

Recomendations

none

Rate your security posture in these key areas

▪ Visibility of asset inventory and attack possibilities
▪ Controls and processes to protect assets from cyber attacks
▪ Ability to detect, investigate and manage attacks
▪ Ability to respond to and recover from security events
▪ Level of automation in the security area
Source: it.portal
1 / 2 Next
▪ Cyber ​​resilience
▪ ▪ Proactively suppress breaches and attacks
▪ Operational resistance
▪ ▪ Avoid costly downtime for employees and customers
▪ Financ... viac...
Source: it.portal
we have a Firewall so I am safe from attacks
Source: it-portal.sk
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Source: KCCKB
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
none

What is what in IT

67
none

Interesting

22
none

Recomendations

23
none

Institutions

9
none

Legislative

14
none

Norms

25
none

Events

1
Contact us by e-mail
Copyright © 2019 - 2024
Cookies | Privacy policy | Terms of use