Recomendations
 |
Data Protection
Implement data classification
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is, among other things, a malicious computer program that records everything you type on your keyboard, including words, characters and symbols, and sends all recorded de... more...
is one of the fastest ways to identify weak points in information systems before a cyber attacker finds them. The scanner is software that generates a detailed report on ... more...
Source: it.portal
show all
 Interesting
|
22 |
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... more...
Source: CheckPoint Research
show all
 Recomendations
|
377 |
Implement exercises at least once a year
Source: it.portal
Implement centralized logging and monitoring.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o všeobecnej bezpečnosti výrobkov a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Nariadenie Európskeho parlamentu a Rady (EÚ) 2025/37 z 19. decembra 2024, ktorým sa mení nariadenie (EÚ) 2019/881, pokiaľ ide o riadené bezpečnostné služby (Text s význam... more...
show link
Source: Eur-Lex
show all
 Norms
|
25 |
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|