Recomendations
 |
Compliance and Audit
Implement internal audits according to ISO 27001
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a set of processes, best practices and technology solutions that help protect critical systems, network and data from unauthorized access or attacks
Source: it.portal
The NIS2 directive creates new space to strengthen the level of cyber security across the EU. This updated version of the first directive on network and information secur... more...
show all
 Interesting
|
22 |
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
show all
 Recomendations
|
377 |
Help enable MFA on email and banking
Source: it.portal
Teach to verify sources and data
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti a znalostnom štandarde audítora show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information security, cybersecurity and privacy protection - Information security management systems — Requirements
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|