Infographics
 |
Implemented specialized training in the field of cyber security
Source: Enisa
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... viac...
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... viac...
Source: ISO
show all
 Technologies
|
14 |
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|