300,000 new instances of malware are generated daily
It takes 49 days on average to detect malware
52% of all phishing attacks worldwide in Q1 2022 involved LinkedIn (by brand)
57% of organizations expect to change their primary backup solution in 2023
70% of boards in 2026 will have a member responsible for cyber security
74% of organizations will use cloud services for data protection by 2025
79% of organizations have a security gap
80% of organizations will use BaaS/DRaaS for at least some of their servers
80% of workers need up to 8 searches to find the document they need for work
85% of organizations had at least one ransomware attack in the past year
8 percent increase in global cyberattacks per week
92% of malware is distributed via email
95% of cyber problems are caused by user behavior itself
Atlassian releases critical software patches
Chrome 120 fixes 10 vulnerabilities
Hackers claim to have accessed medical data of the Israeli Defense Forces
Japan's space program at risk after Microsoft Active Directory breach
Cybercriminals are selling access to Chinese surveillance cameras
Nissan is investigating the cyber attack and potential data breach
87% increase in IoT malware in 2022 compared to 2021
Data leak from the mujRozhlas audio portal
More than 20,000 MS Exchange servers are exposed to attacks
Životný cyklus škodlivého útoku
Administrative security
Acceptable risk
Active safety
Active digital footprint
IS risk analysis
Risk analysis
Risk analysis - copy
Cookies
Data center
DDoS (Distributed Denial of Service)
Digital footprint
DoS (Denial of Service)
Availability
SIEM functionalities
Physical and object security
Assessment of the severity of impacts
Hosting
Threats and challenges in 2024
HUB
Identification of vulnerabilities
ISMS (Information Security Management System)
ISO 27001 - Security of Information Technologies
Keylogger
Cyber security
Cyber safe
Malware
Extremely high risk
Minimum successful backup strategy
Zero trust model
Zero trust model
Model of zero trust - the employee needs
Immutable data
Disaster recovery
Passive digital footprint
Penetration test
Penetration tests
Personal security
Phishing
Business continuity plan - Main components
Disaster recovery plan - Key areas
A network disaster recovery plan includes the following
Fake phone number
Fire safety of buildings (PBS)
The probability of fulfilling the risk scenario
Industrial safety
Ransomware
Scareware
SIEM
SLA (Service Level Agreement)
Social Engineering
Spear phishing
Spoofing
Disaster recovery strategy
Vulnerability test
Types of incidents
Web hosting
Backup - Strategy 3-2-1
Backup - Strategy 3-2-1-1-0
Midfield - Strategy 4-3-2
Severity of risks
The lifecycle of a malicious attack
Vulnerability
NIS2
NIS2 - Basic subjects - Essential
NIS2 - Important subjects - Important
NIS2 - Who falls within the framework
NIS2 - Supply Chain Security Review
01. O programovaní
Bezpečnosť vs informácie
Bezpečnosť vs ja ju nepotrebujem
Bezpečnosť vs ja tomu nerozumiem
Dnešná každodenná téma - 01
Dnešná každodenná téma - 02
Dnešná každodenná téma - 03
Dnešná každodenná téma - 04
Kyberbezpečnosť je téma stále a nikdy neskončí.
Linkedin 2021
Plán kontinuity podnikania
Proti nekalým praktikám nasadíme technológie
THREAT INTELLIGENCE REPORT 30. októbra 2023
Agreement on the level of services provided
is a system of measures related to the selection, designation and control of persons who may become familiar with classified information to a specified extent.
show all
Atlassian vydal softvérové opravy na riešenie štyroch kritických chýb vo svojom softvéri, ktoré by v prípade úspešného zneužitia mohli viesť k vzdialenému spusteniu kódu.
show all
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
▪ Visibility of asset inventory and attack possibilities
▪ Controls and processes to protect assets from cyber attacks
▪ Ability to detect, investigate and manage...
viac...
Source: it.portal
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností
show link
Vyhláška Národného bezpečnostného úradu, ktorou sa mení a dopĺňa vyhláška Národného bezpečnostného úradu č. 453/2007 Z. z. o administratívnej bezpečnosti
show link
show all
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
EN ▪ Information security, cybersecurity and privacy protection — Guidance on managing information security risks
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel...
viac...
show link
Certifications
0
Acreditations
0
Contact us by e-mail