What is what in IT
 |
Backup - Strategy 3-2-1-1-0
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
|
• Know your assets • Know your threats • Define your RTO and RPO • Set up sites for disaster recovery • Test backup and restore services
is a risk that a person is willing to accept, or admit, undergo
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... more...
|
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
• 3 Copies • 2 Media • 1 Location outside
Source: it.portal
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
• Business continuity team • List of basic services • Criticality factor of basic services • Action plan to maintain the basic service • Key customers more...
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
• 3 Copies • 2 Media • 1 Location outside - Off-site • 1 Backup without connectivity - Offline • 0 Error
Source: it.portal
show all
 Interesting
|
22 |
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... more...
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... more...
show all
 Recomendations
|
377 |
Help set up private accounts
Source: it.portal
Implement regular reports for management.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
ZÁKON o dôveryhodných službách pre elektronické transakcie na vnútornom trhu a o zmene a doplnení niektorých zákonov (zákon o dôveryhodných službách)
show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu o administratívnej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1... more...
Source: ISO
Information technology — Security techniques — Information security management — Organizational economics
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|