Interesting
 |
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
• Unsolicited content • Malicious code • Obtaining information • Intrusion attempt • Penetration • Unavailability • Risk of information security more...
is information that is stored on your computer and is subsequently used to track your activity, visited pages, what you search for, what you buy in e-shops, etc.
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... more...
Source: it.portal
Check and adjust privacy settings
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
ZÁKON ze dne 14. září 2000 o informačních systémech veřejné správy a o změně některých dalších zákonů show link
Source: e-sbirka
Zákon o elektronických komunikáciách show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|