The ABC of Information Security

There are three fundamental elements that must not be overlooked when starting out in corporate security, summarized as the ‘ABC of information security’.

Irish businesses may be penalized over inadequate IT security

Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.

5 steps to take after a company is infected

Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.

7 tasks that waste your IT team’s time

IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things that waste your IT team’s time.

Phishing, exploits and botnets – how can they affect your business?

How can phishing exploits and botnets affect a business?

How can businesses save money on internet security in 2015?

A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.

Obama to propose legislation that protects firms sharing cyberthreat data

President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.

Hypercom payment terminals bricked… but not by malware

When ‘several thousand’ payment terminals across the country stopped working last week, it would be easy to jump to the conclusion that some malicious malware was on the loose, but the truth had nothing to do with cybercriminals, Brian Krebs of Krebs on Security explains.

Company data at risk by widespread employee access

A large number of companies are leaving their confidential files at risk by over-sharing with employees, according to a new survey by the Ponemon Institute.

Is your business prepared to continue? Watch now and get started with BCM

Planning your 2015 budget? Forecasting 2015 sales? Don’t forget a plan to survive “adverse events” from hurricanes to viruses, virtual and medical. This recorded webinar will help you get started with business continuity management or BCM.

STEM education, the Target data breach, and the Apple SSL vulnerability

Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?

Security awareness for the smaller business

People are often the weakest link when it comes to business security lapses. Here’s our guide to providing security training and awareness for your staff.

Advanced Heuristics

When something in your vicinity happens, you know right away if it is good or right. When the traffic light on a busy road is red, you know not to cross and when it is green you can cross, but still be looking around to see if it is safe. With different instances that are

How to protect your small business

Cyber criminals undoubtedly attack big businesses but smaller businesses are vulnerable too and often fail to take basic steps to protect themselves. Here’s our top tips to help keep your small business secure.

Why Anti-Virus is not a waste of money

It has happened before, it just happened again and it will happen in the future. It is inevitable! Some company that needs to get some press coverage or public visibility will release yet another statement on how worthless Anti-Virus is, based on its own dysfunctional test. For this “test”, they used the VirusTotal service. VirusTotal

The Dynamic Duo for Securing your Android: Common Sense and Security Software

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,

Bad password choices: don't miss the point

Phish, Phowl, and Passwords I spend a lot of time defending educational as opposed to purely technical solutions to security. Not that I don’t believe in the usefulness of technical solutions: that is, after all, ESET’s basic business. However, there are many people in the security business who believe that education is a waste of

ZeroAccess? Much too much access…

Why the ZeroAccess rootkit family modifications are important to the end user.

SMSmishing Unabated: Best Buy targeted by fake gift card campaign

News of SMS (text) phishing scams are nothing new to readers of this blog.  ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen

Guarding against password reset attacks with pen and paper

With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics.  In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem:  How to guard

Follow us

Copyright © 2015 ESET, All Rights Reserved.