Recomendations
 |
PROTECT PERSONAL DATA - 07. Do not believe urgent news
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a set of measures that must be met during the design, implementation and use of buildings
is a form of malware that uses social engineering to induce fear or a perception of threat in order to manipulate a user into downloading or purchasing malicious software... viac...
show all
Source: CheckPoint Research
The report from December 29, 2023 states that there was a theft of user data from the "mujRozhlas" audio portal, which the radio learned about on December 20, 2023. In th... viac...
show all
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
I don't have to deal with security when I have infrastructure with a service provider such as Data center
Source: it-portal.sk
show all
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
Zákon, ktorým sa mení zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov show link
Source: Časová verzia predpisu účinná od 30.06.2022
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
Information security, cybersecurity and privacy protection — Governance of information security
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|