Media
 |
Phishing is just the elementary school of cyberattacks. What does the medium and high one look like?
Source: HN špeciál
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a service to provide server performance and disk space for customer applications.
Source: it-portal.sk
• Collection of data and events • Data normalization • Correlation • Log management • Monitoring of users and applications • Audit reporting
Source: it-portal
show all
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
Reduce the amount of information you provide about yourself in Internet service settings. Carefully consider what personal information you include on your profile. Choose... viac...
Source: KCCKB
show all
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
show all
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|