What is what in IT
 |
Backup - Strategy 3-2-1
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
 Actual incidents
|
6 |
▪ The affected entities must register an overview of subcontractors ▪ Subcontractors are obliged to report security incidents ▪ The obligation of the affected ent... viac...
is an attack on a server or network that overwhelms the network or server with a huge number of requests and causes the service to be unavailable.
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
show all
Cybersecurity and Infrastructure Security Agency show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Zákon o elektronických komunikáciách show link
show all
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
show all
 Technologies
|
14 |
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
 Events
|
1 |
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|