This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
What is what in IT
Disaster recovery
is the organization's ability to react and recover from an event that negatively affected the company's operations
Previous
7 / 7
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CERT-EU Threat intelligence
show link
CheckPoint Research
show link
show all
What is what in IT
66
A network disaster recovery plan includes the following
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
DoS (Denial of Service)
is an attack on a server or network that overwhelms the network or server with a huge number of requests and causes the service to be unavailable.
show all
Interesting
22
300,000 new instances of malware are generated daily
Source: Internet
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
Source: CheckPoint Research
show all
Recomendations
377
Supplier responsibility
Develop and implement a security policy.
Source: it.portal
Online Threats
Recommend antivirus and regular updates
Source: it.portal
show all
Institutions
51
NCC-RO
Centrul Național de Coordonare
show link
NCC-CY
Digital Security Authority (DSA) - Cyprus
show link
show all
Legislative
82
436/2019 Z. z.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti a znalostnom štandarde audítora
show link
Source: Slov-Lex
134/2016 Z. z.
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: Slov-Lex
show all
Norms
25
ISO/IEC 27002:2022
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
ISO/IEC 27014:2020
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
Technologies
14
CISCO
Supermicro
show link
show all
Infographics
7
TEST prenosu na LOCAL
Source: TEST prenosu na LOCAL
Implemented specialized training in the field of cyber security
Source: Enisa
show all
Events
0
Certifications
0
Acreditations
0
Media
436
Zero Trust Step Three: Build a Zero Trust Architecture
show link
Source: Threat Talks
Nemocnice majú traumatologický plán. Máte taký plán aj pre IT?
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use