What is what in IT
 |
Midfield - Strategy 4-3-2
• 4 Copies • 3 Locations • 2 Off-site locations
Source: it.portal
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
is the organization's ability to react and recover from an event that negatively affected the company's operations
show all
viac ako 80 000 sledovacích kamier Hikvision na svete bolo v roku 2022 bolo zraniteľných prienikom k riadiacim príkazom.
Hikvision – je skratka pre Hangzhou Hikvisio... viac...
show all
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Zákon, ktorým sa mení a dopĺňa zákon č. 69/2018 Z. z. o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov v znení neskorších predpisov a ktorým sa menia a... viac...
show link
show all
Information technology — Security techniques — Information security management systems — Guidance
Source: ISO
Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|