Infographics
 |
Implemented specialized training in the field of cyber security
Source: Enisa
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... viac...
is a summary of measures in the relevant area to reduce the probability of the occurrence of dangerous situations
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Zákon o elektronických komunikáciách show link
show all
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Requirements for bodies providing audit and certification of information security management systems — Part 2: Privacy information management systems
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|