This website uses cookies. We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... viac...
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...