What is what in IT
 |
Penetration tests
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
|
is a risk that a person is willing to accept, or admit, undergo
|
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... more...
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
show all
 Recomendations
|
377 |
Implement regular password changes
Source: it.portal
Implement reporting to the board
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
ZÁKON ze dne 29. ledna 2025, kterým se mění zákon č. 127/2005 Sb., o elektronických komunikacích a o změně některých souvisejících zákonů (zákon o elektronických komunika... more...
show link
Source: e-sbirka
Vyhláška Národného bezpečnostného úradu, ktorou sa mení vyhláška Národného bezpečnostného úradu č. 336/2004 Z. z. o fyzickej bezpečnosti a objektovej bezpečnosti v znení ... more...
show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|