Examples of using Possible vulnerabilities in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
We monitor our systems for possible vulnerabilities and attacks.
Protected view Excel 2010 includes a Protected View,so you can make more informed decisions before exposing your computer to possible vulnerabilities.
Monitoring our systems for possible vulnerabilities and attacks;
In this sense, Panda Adaptive Defense not only controls the permissions that each program has, guaranteeing that only trusted people have access, butit also evaluates in real time all running processes to act against possible vulnerabilities.
We supervise our systems for possible vulnerabilities and attacks.
The security of our data processing activities is ensured by the implementation of adequate technical safeguards such as pseudonymisation and encryption of personal data andregularly monitoring our servers and IT systems for possible vulnerabilities and attacks.
We control our systems in search of possible vulnerabilities and attacks.
We regularly monitor our systems for possible vulnerabilities and attacks and regularly review our information collection, storage, and processing practices to update our physical, technical and organizational security measures.
I monitor the website systems for possible vulnerabilities and attacks.
We regularly monitor our systems for possible vulnerabilities and attacks, and we look to identify ways to further strengthen security.
We ensure that our systems are regularly monitored for possible vulnerabilities and attacks.
Lundbeck regularly audits its system for possible vulnerabilities and attacks and when you use our contact form under“contact us” the transmission is encrypted.
We monitor our website dashboard and administrative panel for possible vulnerabilities and attacks.
We monitor our systems for possible vulnerabilities and attacks with security software.
In June 2014,(likely) Russian hackers used a list of applications andprograms used by JP Morgan's computers and crosschecked it with possible vulnerabilities to find a way into the bank's system.
We monitor our systems for possible vulnerabilities and attacks like Wordfence.
Powered by a high-tech graphical user interafce,Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.
Recognize any errors or possible vulnerabilities in the network or system.
Our systems and website are monitored for possible vulnerabilities and attacks.
We regularly monitor our system for possible vulnerabilities and attacks, and we are continuously testing to identify ways to further strengthen security.
Regularly monitoring our servers and IT systems for possible vulnerabilities and attacks.
We regularly monitor our system for possible vulnerabilities and attacks, and we carry out periodic testing to identify ways to further strengthen security.
Regularly monitoring our systems for possible vulnerabilities and attacks.
We regularly monitor our system for possible vulnerabilities and attacks and we carry out security testing of our website& networks to identify ways to further strengthen security.
Lundbeck regularly audits its system for possible vulnerabilities and attacks.
To protect any data you store on our servers,we also regularly audit our system for possible vulnerabilities and attacks and we use a tier-one secured-access data center.
To protect any data you store on our servers,GajGal also regularly audits its system for possible vulnerabilities and attacks, and we use a tier-one secured-access data center.
To protect any data youstore on our servers, we also regularly audit our system for possible vulnerabilities and attacks, and we use a tier-one secured-access data center.