Security and Education
To some extent, the security software industry relies on the idea that there is always a technological answer to a tech problem but 'always' is a big word.
To some extent, the security software industry relies on the idea that there is always a technological answer to a tech problem but 'always' is a big word.
Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.
Information security has become an even more critical factor of the business model, as it protects the most essential asset: information.
IT teams' time is always limited, and it doesn't help when other things get in the way. Here's seven things that waste your IT team's time.
How can phishing exploits and botnets affect a business?
A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
President Barack Obama is planning to push legislation which would protect companies from lawsuits for sharing cyberthreat data with the government, reports the Washington Post.
When 'several thousand' payment terminals across the country stopped working last week, it would be easy to jump to the conclusion that some malicious malware was on the loose, but the truth had nothing to do with cybercriminals, Brian Krebs of Krebs on Security explains.
A large number of companies are leaving their confidential files at risk by over-sharing with employees, according to a new survey by the Ponemon Institute.
Planning your 2015 budget? Forecasting 2015 sales? Don't forget a plan to survive "adverse events" from hurricanes to viruses, virtual and medical. This recorded webinar will help you get started with business continuity management or BCM.
Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?
People are often the weakest link when it comes to business security lapses. Here’s our guide to providing security training and awareness for your staff.
When something in your vicinity happens, you know right away if it is good or right. When the traffic light on a busy road is red, you know not to cross and when it is green you can cross, but still be looking around to see if it is safe. With different instances that are
Cyber criminals undoubtedly attack big businesses but smaller businesses are vulnerable too and often fail to take basic steps to protect themselves. Here’s our top tips to help keep your small business secure.
It has happened before, it just happened again and it will happen in the future. It is inevitable! Some company that needs to get some press coverage or public visibility will release yet another statement on how worthless Anti-Virus is, based on its own dysfunctional test. For this “test”, they used the VirusTotal service. VirusTotal
On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,
Phish, Phowl, and Passwords I spend a lot of time defending educational as opposed to purely technical solutions to security. Not that I don’t believe in the usefulness of technical solutions: that is, after all, ESET’s basic business. However, there are many people in the security business who believe that education is a waste of
Why the ZeroAccess rootkit family modifications are important to the end user.
News of SMS (text) phishing scams are nothing new to readers of this blog. ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen
With the recent announcements of password breaches at LinkedIn, and warnings from Google about state-sponsored attacks on Gmail accounts, it seems like a good idea now to review some password security basics. In this blog post, we’re going to take a look at a rather low-tech solution to a decidedly high-tech problem: How to guard