This website uses cookies.
We use so-called cookies to operate our website. Cookies are files used to customize the content of a website, to measure its functionality and generally to ensure your maximum satisfaction.
necessary
preferential
statistical
marketing
unclassified
Enable selected
Enable all
it-security
FORUM
HOME
BLOG
LOGIN
SK
CZ
EN
Media
Phishing is just the elementary school of cyberattacks. What does the medium and high one look like?
https://hnonline.sk/hn-special/96112089-phishing-je-len-zakladna-skola-kyberutokov-ako-vyzera-ta-stredna-a-vysoka
Source: HN špeciál
Previous
3 / 1
More information, which may be usefull to you, may be found after login at it-portal.sk
Actual incidents
6
CISA - CYBER INCIDENTS
show link
CERT-EU Threat intelligence
show link
show all
What is what in IT
68
Assessment of the severity of impacts
• Catastrophic
• Serious
• Medium
• Minimal
• Negligible
Source: it-portal.sk
Social Engineering
is a deliberate procedure, based on lies, manipulation or coercion, by which the attacker tries to achieve his goal.
show all
Interesting
22
80% of organizations will use BaaS/DRaaS for at least some of their servers
Source: Veeam
79% of organizations have a security gap
Source: Internet
show all
Recomendations
23
Secure digital identity of the employee using the card and its options
▪ strong two-factor authentication
▪ electronic signature
▪ safe storage of cryptographic keys
▪ storage of third-party certificates
▪ setting specific se...
viac...
Source: it.portal
Security is also regular testing of infrastructure and data recovery
show all
Institutions
9
CISA
Cybersecurity and Infrastructure Security Agency
show link
WORD-LEX
Legal and information portal
show link
show all
Legislative
14
48/2019 Coll.
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností
show link
45/2011 Coll.
Zákon o kritickej infraštruktúre
show link
show all
Norms
25
ISO/IEC TS 27008:2019
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
ISO/IEC 27006:2015
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems
Source: ISO
show all
Technologies
14
Ubiquiti
show link
OpenVPN
show link
show all
Infographics
7
Implemented specialized training in the field of cyber security
Source: Enisa
Attacks on different sectors by number of incidents 2022-2023
Source: Enisa
show all
Events
1
MWC Barcelona 2024
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Media
8
Social engineers are already cutting you
show link
Source: HN špeciál
When to repeat a cyber security audit?
show link
Source: HN špeciál
show all
Contact us by e-mail
Copyright © 2019 - 2026
Cookies
|
Privacy policy
|
Terms of use