What is what in IT
 |
Severity of risks
• extremely high • high • low • negligible
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
• Have multiple copies of data - at least 3 • Saving copies of data in geographically different locations • Have at least one copy immediately available for quick... viac...
Source: it.portal
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Source: it.portal
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
National Office for Cyber and Information Security show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti show link
Zákon o elektronických komunikáciách show link
show all
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|