You always build from the ground up, and every small-medium business (SMB) must build a strong foundation with their management team.
Archives - 2017
In the first part of our series we addressed issues such as the role an everyday internet user has in making the internet a safer place, and ID theft. The second part of the Twitter chat continues with the theme of Simple Steps to Online Safety.
Just as there are ways to audit, manage and protect electronic documents, there are ways to manage printed documents, too.
We've gathered our own thoughts on the topics chosen each week for this short series of blogs that will be published twice a week.
The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is.
‘KRACK’ or Key Reinstallation AttaCK, as it has been labeled, means third parties could eavesdrop on a network meaning private conversations would no longer be private.
Malware simulators are not an appropriate basis for testing product detection capabilities.
DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.
National Cyber Security Awareness Month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks.
The countdown is on. In just over eight months’ time, the General Data Protection Regulation (GDPR) will come into force and this will have huge implications for businesses.
A recent Ipsos survey, found that only 26 per cent of Canadian SMBs feel very confident that their business and its information is safe from cyberattacks
By the 1800s, long before the famous Enigma machine and military computerization to decipher codes, a Victorian woman trapped in a patriarchal world, glimpsed the potential reach of computing and the change it would impose on humanity.
As the Asia Pacific region continues to grow, and adoption of digital technologies – by consumers and businesses – continues, the region is starting to appreciate how attractive it has become to cybercriminals.
Cybersecurity is everyone’s responsibility and organisations need to train staff to ensure they have a more empowered and security savvy workforce.
The annual Virus Bulletin International Conference takes place in Madrid, Spain this October and ESET will be well represented across the three-day event.
The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes.
European Cyber Security Month and similar events, give cybersecurity companies the opportunity to reach out to the masses and get them involved.
Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your own network.
What's safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.