This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
What is what in IT
Disaster recovery strategy
is a document that is the cornerstone of ensuring the continuous operation of infrastructure and applications when a major outage occurs.
Previous
4 / 7
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
Disaster recovery strategy
is a document that is the cornerstone of ensuring the continuous operation of infrastructure and applications when a major outage occurs.
show all
Interesting
22
92% of malware is distributed via email
Source: Internet
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
show all
Recomendations
377
Online súkromie
Explain risks and caution
Source: it.portal
Technical measures
Implement off-site or cloud backups.
Source: it.portal
show all
Institutions
51
NCC-HR
Croatian Academic and Research Network – CARNET (NCC-HR)
show link
NCC-BE
National Cybersecurity Coordination Centre Belgium
show link
show all
Legislative
82
281/2023 Z. z.
Zákon o všeobecnej bezpečnosti výrobkov a o zmene a doplnení niektorých zákonov
show link
Source: Slov-Lex
190/2023 Sb.
Vyhláška o bezpečnostních pravidlech pro orgány veřejné moci využívající služby poskytovatelů cloud computingu
show link
Source: e-sbirka
show all
Norms
25
ISO/IEC TR 27016:2014
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
ISO/IEC 27000:2018
Information technology. Security techniques. Information security management systems. Overview and vocabulary
show link
Source: STN
show all
Technologies
14
Fortinet
show link
Check Point
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
TEST prenosu na LOCAL
Source: TEST prenosu na LOCAL
show all
Events
0
Certifications
0
Acreditations
0
Media
436
5 najdrahších vírusov v histórii | Kybernetické útoky | Osobnyudaj.sk
show link
Source: Osobnyudaj.sk
NIS2 v praxi (Adam Kučínský, NÚKIB)
show link
Source: Bezpečný online svet
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use