Recomendations
 |
MYTH about cyber security - 01.
we have a Firewall so I am safe from attacks
Source: it-portal.sk
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a system of measures to protect classified information from unauthorized persons and from unauthorized manipulation in objects and protected spaces.
are tools for collecting and continuously evaluating cyber security events
Source: it.portal
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Zákon o elektronických komunikáciách show link
show all
Information security, cybersecurity and privacy protection — Guidelines for information security management systems auditing
Source: ISO
Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|