Recomendations
 |
Security is also current operational documentation
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
means the possible time of use of the service, hardware, software or other resources for operation, given in %.
sú kontrolovanou formou hackingu, ktorá využíva pokročilé techniky a metódy, pomocou ktorých simuluje postupy kybernetického útočníka pri útoku na systém.
Source: it.portal
show all
Tens of thousands of Microsoft Exchange email servers in Europe, the US and Asia are vulnerable to remote code execution. There is a version of the software in the mail s... viac...
show all
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|