Recomendations
 |
PROTECT PERSONAL DATA - 07. Do not believe urgent news
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
|
▪ Cyber resilience ▪ ▪ Proactively suppress breaches and attacks ▪ Operational resistance ▪ ▪ Avoid costly downtime for employees and customers ▪ Financ... viac...
Source: it.portal
we have a Firewall so I am safe from attacks
Source: it-portal.sk
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
bezpečnosťou sa nemusím zaoberať ak môj počítač nie je pripojený do siete alebo na internet
Source: it-portal.sk
|
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
Do not click on Internet links in e-mail messages. Type the address of the website you want to visit into the address bar of the Internet browser. Why? The link in the em... viac...
Source: KCCKB
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
|
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
SMS messages or e-mails that promise price discounts, profit, or any other financial benefits are of course tempting. However, you must not run into them.
Source: KCCKB
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
Vytvárajte heslá, ktoré majú aspoň 15 znakov a obsahujú kombináciu veľkých a malých písmen, číslic a symbolov, ak to aplikácia umožňuje.
Source: KCCKB
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
|
|
is a place that can be abused by a threat and cause a negative impact on the organization's assets
Source: it.portal
• Have multiple copies of data - at least 3 • Saving copies of data in geographically different locations • Have at least one copy immediately available for quick... viac...
Source: it.portal
show all
we have a Firewall so I am safe from attacks
Source: it-portal.sk
Ak to aplikácia umožňuje, nastavte si viacfaktorové overenie (autentizáciu) pri ktorej musíte na dvoch alebo viacerých stupňoch preukázať dôkazy (faktory) na potvrdenie v... viac...
Source: KCCKB
show all
National Office for Cyber and Information Security show link
The Computer Emergency Response Team for the EU institutions, bodies and agencies show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
Vyhláška Národného bezpečnostného úradu o audite kybernetickej bezpečnosti show link
show all
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations — Technical ... viac...
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|