Actual incidents
|
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
we have a Firewall so I am safe from attacks
Source: it-portal.sk
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
show all
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|