Media
 |
Váš IT tím potrebuje nástroje. Stále totiž opravuje zraniteľnosti
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a type of fraud in which a criminal disguises a phone number, text message, email address, display name, or web address to make the user believe they are communicating... more...
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Establish a central risk repository.
Source: it.portal
Implement a logging and recordkeeping system.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o slobodnom prístupe k informáciám a o zmene a doplnení niektorých zákonov (zákon o slobode informácií) show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Chatovanie a zdieľanie súborov v aplikácii Teams show link
Source: Microsoft365
show all
Contact us by e-mail
|