This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
IT - SECURITY
FORUM
HOME
LOGIN
SK
CZ
EN
Media
Počítače sú v bezpečí vypnuté a v trezore. Ale je aj iná možnosť
https://hnonline.sk/hn-special/96197343-pocitace-su-v-bezpeci-vypnute-a-v-trezore-ale-je-aj-ina-moznost
Source: HN špeciál
Previous
4 / 3
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
Report an incident
show link
CISA - CYBER INCIDENTS
show link
show all
What is what in IT
67
SLA (Service Level Agreement)
Agreement on the level of services provided
Disaster recovery plan - Key areas
• Know your assets
• Know your threats
• Define your RTO and RPO
• Set up sites for disaster recovery
• Test backup and restore services
show all
Interesting
22
74% of organizations will use cloud services for data protection by 2025
Source: Veeam
85% of organizations had at least one ransomware attack in the past year
Source: Veeam
show all
Recomendations
23
MYTH about cyber security - 05.
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
PROTECT PERSONAL DATA - 05. Do not share your location
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Institutions
9
NIST
National Institute of Standards and Technology
show link
WORD-LEX
Legal and information portal
show link
show all
Legislative
16
134/2016 Z. z. - kópia
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
Source: SLEX
48/2019 Coll.
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností
show link
show all
Norms
25
ISO/IEC 27004:2016
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
ISO/IEC 27003:2017
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
show all
Technologies
14
Ubiquiti
show link
ESET
show link
show all
Infographics
9
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
TEST prenosu na LOCAL
Source: TEST prenosu na LOCAL
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
22
When to repeat a cyber security audit?
show link
Source: HN špeciál
Security hardening: basic principles for increasing (not only) server security
show link
Source: MasterDC
show all
Contact us by e-mail
Copyright © 2019 - 2025
Cookies
|
Privacy policy
|
Terms of use