Recomendations
 |
PROTECT PERSONAL DATA - 09. Do not install unnecessary things
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remove unnecessary applications. At the same time, the only safe way to get apps is to download them directly from the official store (Google Play, Apple App Store, etc.). Think about what data and consents you provide when confirming the software license.
Source: KCCKB
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
• Catastrophic • Serious • Medium • Minimal • Negligible
Source: it-portal.sk
• Survey • Initial access • Startup • Credential access and privilege escalation • Lateral movement • Collection and exfiltration • Installation o... viac...
Source: it.portal
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
▪ Visibility of asset inventory and attack possibilities ▪ Controls and processes to protect assets from cyber attacks ▪ Ability to detect, investigate and manage... viac...
Source: it.portal
▪ The complexity of the IT infrastructure ▪ Cyber attacks ▪ Reactive threat management ▪ Gaps in security skills ▪ Challenges in the field of regulation... viac...
Source: it.portal
show all
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|