This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
it-security
FORUM
HOME
BLOG
LOGIN
SK
CZ
EN
Infographics
1 / 1
ALL
10 biggest threats for 2030
Source: ENISA
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
Certified data centers in Slovakia and the surrounding area (14) according to the Uptime Institute
To ale neznamená, že sú jediné
Source: Uptime Institute
Certified data centers in the given territory of Europe (309)
Source: Uptime Institute
Data centers in Bratislava according to Google Maps
To ale neznamená, že sú jediné
Source: Google Maps
Implemented specialized training in the field of cyber security
Source: Enisa
Actual incidents
6
NÚKIB - Threats and vulnerabilities
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
67
HUB
a common connection point for devices on a network to connect local LAN segments
Passive digital footprint
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
Interesting
22
It takes 49 days on average to detect malware
Source: Internet
70% of boards in 2026 will have a member responsible for cyber security
Source: Gartner
show all
Recomendations
23
MYTH about cyber security - 05.
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
MYTH about cyber security - 04.
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
show all
Institutions
9
WORD-LEX
Legal and information portal
show link
CISA
Cybersecurity and Infrastructure Security Agency
show link
show all
Legislative
14
134/2016 Coll.
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti
show link
301/2013 Coll.
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa
show link
show all
Norms
25
ISO/IEC 27000:2018
EN ▪ Information technology — Security techniques — Information security management systems — Overview and vocabulary
Source: ISO
ISO/IEC 27006:2015
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
show all
Technologies
14
Supermicro
show link
Ubiquiti
show link
show all
Infographics
6
10 biggest threats for 2030
Source: ENISA
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
8
Security hardening: basic principles for increasing (not only) server security
show link
Source: MasterDC
Social engineers are already cutting you
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2024
Cookies
|
Privacy policy
|
Terms of use