|
| Bezpečnosť vs ja ju nepotrebujem |
|
|
| Bezpečnosť vs ja tomu nerozumiem |
|
|
| Dnešná každodenná téma - 01 |
|
|
| Dnešná každodenná téma - 02 |
|
|
| Dnešná každodenná téma - 03 |
|
|
| Dnešná každodenná téma - 04 |
|
 |
| it-portal.sk ZAČÍNAME |
|
 |
| Kyberbezpečnosť je téma stále a nikdy neskončí. |
|
 |
| Linkedin 2021 |
|
 |
| Plán kontinuity podnikania |
|
|
| Proti nekalým praktikám nasadíme technológie |
|
|
| THREAT INTELLIGENCE REPORT 30. októbra 2023 |
|
 |
| Bezpečné heslo |
|
 |
| ... Podvodníci, kteří se vydávají za Policii |
|
 |
| ... Zastavil jsem podvody z Kolumbie |
|
|
| Reportéři ČT: Zloději on-line |
|
 |
| ... ak je to veľmi výhodná ponuka |
|
 |
| ... ak niekto nalieha na vaše rýchle rozhodnutie |
|
 |
| Certification Key actors and their role |
|
 |
| Cyber Safety At Home - GoldPhish |
|
 |
| ENISA |
|
 |
| European Cybersecurity Skills Framework (ECSF) - Introduction |
|
300,000 new instances of malware are generated daily
|
It takes 49 days on average to detect malware
|
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
|
57% of organizations expect to change their primary backup solution in 2023
|
70% of boards in 2026 will have a member responsible for cyber security
|
74% of organizations will use cloud services for data protection by 2025
|
79% of organizations have a security gap
|
80% of organizations will use BaaS/DRaaS for at least some of their servers
|
80% of workers need up to 8 searches to find the document they need for work
|
85% of organizations had at least one ransomware attack in the past year
|
8 percent increase in global cyberattacks per week
|
92% of malware is distributed via email
|
95% of cyber problems are caused by user behavior itself
|
Atlassian releases critical software patches
|
Chrome 120 fixes 10 vulnerabilities
|
Hackers claim to have accessed medical data of the Israeli Defense Forces
|
Japan's space program at risk after Microsoft Active Directory breach
|
Cybercriminals are selling access to Chinese surveillance cameras
|
Nissan is investigating the cyber attack and potential data breach
|
87% increase in IoT malware in 2022 compared to 2021
|
Data leak from the mujRozhlas audio portal
|
More than 20,000 MS Exchange servers are exposed to attacks
|
|
Životný cyklus škodlivého útoku
|
Administrative security
|
Acceptable risk
|
Active safety
|
Active digital footprint
|
IS risk analysis
|
Risk analysis
|
Risk analysis - copy
|
Cookies
|
Data center
|
DDoS (Distributed Denial of Service)
|
Digital footprint
|
DoS (Denial of Service)
|
Availability
|
SIEM functionalities
|
Physical and object security
|
Assessment of the severity of impacts
|
Hosting
|
Threats and challenges in 2024
|
HUB
|
Identification of vulnerabilities
|
ISMS (Information Security Management System)
|
ISO 27001 - Security of Information Technologies
|
Keylogger
|
Cyber security
|
Cyber safe
|
Malware
|
Extremely high risk
|
Minimum successful backup strategy
|
Zero trust model
|
Zero trust model
|
Model of zero trust - the employee needs
|
Immutable data
|
Disaster recovery
|
Passive digital footprint
|
Penetration test
|
Penetration tests
|
Personal security
|
Phishing
|
Business continuity plan - Main components
|
Disaster recovery plan - Key areas
|
A network disaster recovery plan includes the following
|
Fake phone number
|
Fire safety of buildings (PBS)
|
The probability of fulfilling the risk scenario
|
Industrial safety
|
Ransomware
|
Scareware
|
SIEM
|
SLA (Service Level Agreement)
|
Social Engineering
|
Spear phishing
|
Spoofing
|
Disaster recovery strategy
|
Vulnerability test
|
Types of incidents
|
Web hosting
|
Backup - Strategy 3-2-1
|
Backup - Strategy 3-2-1-1-0
|
Midfield - Strategy 4-3-2
|
Severity of risks
|
The lifecycle of a malicious attack
|
Vulnerability
|
NIS2
|
NIS2 - Basic subjects - Essential
|
NIS2 - Important subjects - Important
|
NIS2 - Who falls within the framework
|
NIS2 - Supply Chain Security Review
|
|
01. O programovaní
|
Bezpečnosť vs informácie
|
Bezpečnosť vs ja ju nepotrebujem
|
Bezpečnosť vs ja tomu nerozumiem
|
Dnešná každodenná téma - 01
|
Dnešná každodenná téma - 02
|
Dnešná každodenná téma - 03
|
Dnešná každodenná téma - 04
|
Kyberbezpečnosť je téma stále a nikdy neskončí.
|
Linkedin 2021
|
Plán kontinuity podnikania
|
Proti nekalým praktikám nasadíme technológie
|
THREAT INTELLIGENCE REPORT 30. októbra 2023
|
|
|
|
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
is a space that is intended for the continuous operation of computer servers, systems and data storage.
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Source: it.portal
show all
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
Zákon o elektronických komunikáciách show link
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|