What is what in IT
 |
Threats and challenges in 2024
• AI and machine learning • Attacks on supply chains and critical infrastructure • Cyber insurance • State-sponsored attacks and hacktivism • Deepfake technology as a weapon • Phishing attacks • Ransomware
Source: CheckPoint
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
|
is a risk that a person is willing to accept, or admit, undergo
|
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... more...
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Teach when to ignore and report fraud
Source: it.portal
Activate 2FA on all accounts
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
ZÁKON ze dne 20. března 2019 o přístupnosti internetových stránek a mobilních aplikací a o změně zákona č. 365/2000 Sb., o informačních systémech veřejné správy a o změně... more...
show link
Source: e-sbirka
Vyhláška Ministerstva dopravy, výstavby a regionálneho rozvoja Slovenskej republiky, ktorou sa ustanovujú podrobnosti o odbornej príprave, o odbornej skúške a o výkone či... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... more...
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
show link
Source: David Šetek - Hackni svou budoucnost
Prihlásenie a začatie práce v aplikácii Teams show link
Source: Microsoft365
show all
Contact us by e-mail
|