Infographics
 |
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
|
|
|
To ale neznamená, že sú jediné
Source: Uptime Institute
|
To ale neznamená, že sú jediné
Source: Google Maps
|
|
• Survey • Initial access • Startup • Credential access and privilege escalation • Lateral movement • Collection and exfiltration • Installation o... viac...
Source: it.portal
is a targeted attempt that looks credible to its victims and thus has a higher probability of success; for example, a spam attack impersonates a message from an organizat... viac...
show all
Tím Malek, ktorý predtým zasiahol súkromnú vysokú školu v Izraeli, sa hlási k zodpovednosti za hacknutie izraelského zdravotného centra Ziv. Skupina hackerov tvrdí, že uk... viac...
show all
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
show all
National Office for Cyber and Information Security show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|