This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Phishingové testy máme, aj tréningy sme si urobili. A teraz – čo?
https://hnonline.sk/hn-special/96233245-phishingove-testy-mame-aj-treningy-sme-si-urobili-a-teraz-co
Source: HN špeciál
Previous
4 / 44
Next
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CheckPoint Research
show link
SK-CERT Safety warnings
show link
show all
What is what in IT
66
Availability
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
Disaster recovery plan - Key areas
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
show all
Interesting
22
74% of organizations will use cloud services for data protection by 2025
Source: Veeam
79% of organizations have a security gap
Source: Internet
show all
Recomendations
377
Data Protection
Implement RBAC control
Source: it.portal
Technical measures
Implement disk and transfer encryption.
Source: it.portal
show all
Institutions
51
WORD-LEX
Legal and information portal
show link
NCSC
The National Cyber Security Centre
show link
show all
Legislative
82
436/2019 Z. z.
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti a znalostnom štandarde audítora
show link
Source: Slov-Lex
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
Oznámenie Komisie Usmernenia Komisie k uplatňovaniu článku 3 ods. 4 smernice (EÚ) 2022/2555 (smernica NIS 2) 2023/C 324/02
show link
Source: Eur-Lex
show all
Norms
25
ISO/IEC CD 27017
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
ISO/IEC FDIS 27011
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
Technologies
14
Mikrotik
show link
Ubiquiti
show link
show all
Infographics
7
Certified data centers in Slovakia and the surrounding area (14) according to the Uptime Institute
To ale neznamená, že sú jediné
Source: Uptime Institute
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
show all
Events
0
Certifications
0
Acreditations
0
Media
436
38. Hacking pro začátečníky - Útok HTML injection
show link
Source: David Šetek - Hackni svou budoucnost
55. Hacking a kybernetická bezpečnost - Nikto a nalezení zajímavých stránek
show link
Source: David Šetek - Hackni svou budoucnost
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use