What is what in IT
 |
The probability of fulfilling the risk scenario
• high • medium • low • very low
Source: it.portal
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
|
is a risk that a person is willing to accept, or admit, undergo
|
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
|
is a summary of the measures taken by a legal entity or a natural person who is an entrepreneur under a special law for the protection of classified facts that have been ... more...
• 4 Copies • 3 Locations • 2 Off-site locations
Source: it.portal
show all
 Interesting
|
22 |
Japonská automobilka Nissan vyšetruje kybernetický útok, ktorý sa zameral na jej systémy v Austrálii a na Novom Zélande, čo mohlo hackerom umožniť prístup k osobným infor... more...
show all
 Recomendations
|
377 |
Implement regular tests
Source: it.portal
Implement a supplier assessment process.
Source: it.portal
show all
 Institutions
|
51 |
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe show link
International Telecommunication Union (ITU) show link
show all
 Legislative
|
82 |
Zákon o kritickej infraštruktúre a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Zákon o ochrane utajovaných skutočností a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection - Information security management systems — Requirements
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|