Recomendations
 |
PROTECT PERSONAL DATA - 09. Do not install unnecessary things
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remove unnecessary applications. At the same time, the only safe way to get apps is to download them directly from the official store (Google Play, Apple App Store, etc.). Think about what data and consents you provide when confirming the software license.
Source: KCCKB
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a document that is the cornerstone of ensuring the continuous operation of infrastructure and applications when a major outage occurs.
• Have multiple copies of data - at least 3 • Saving copies of data in geographically different locations • Have at least one copy immediately available for quick... more...
Source: it.portal
show all
 Interesting
|
22 |
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... more...
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... more...
show all
 Recomendations
|
377 |
Teach not to click on suspicious links
Source: it.portal
Explain risks and caution
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o fungovaní Bezpečnostnej rady Slovenskej republiky v čase mieru show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|