Interesting
 |
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
Source: CheckPoint Research
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
• Unsolicited content • Malicious code • Obtaining information • Intrusion attempt • Penetration • Unavailability • Risk of information security viac...
is information that you leave on the Internet unconsciously and that is not directly visible, for example device type, IP address.
Source: it.portal
show all
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
Source: CheckPoint Research
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
show all
EN ▪ Information security, cybersecurity and privacy protection — Information security controls
Source: ISO
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|