What is what in IT
 |
Spear phishing
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organization or individual that the recipient actually knows
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers more...
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... more...
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
show all
 Recomendations
|
377 |
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
Implement board training
Source: it.portal
show all
 Institutions
|
51 |
Špecializované centrum určené primárne na zvýšenie kybernetickej bezpečnosti siete GOVNET. show link
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe show link
show all
 Legislative
|
82 |
REGULATION (EU) 2021/887 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 20 May 2021 establishing the European Cybersecurity Industrial, Technology and Research Competen... more...
show link
Source: Eur-Lex
Vyhláška o bezpečnostních pravidlech pro orgány veřejné moci využívající služby poskytovatelů cloud computingu show link
Source: e-sbirka
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|