What is what in IT
 |
The probability of fulfilling the risk scenario
• high • medium • low • very low
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is any information you knowingly post online, opinions, ratings, social media interests, photos, addresses, family information, searches, videos watched, music listened t... viac...
• Access to local resources when connecting from the intranet. • Access to resources in the cloud when connecting from the intranet. • Access to local resources w... viac...
Source: it.portal
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
Vyhláška Národného bezpečnostného úradu o priemyselnej bezpečnosti a o bezpečnostnom projekte podnikateľa show link
show all
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|