Business security


170 articles

The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

The big small business security challenge: mobile and BYOD

In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then defensive strategies are presented.

Cameron Camp07 May 2015


The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Lysa Myers20 Mar 2015


White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

White House unveils NIST Framework for Improving Critical Infrastructure Cybersecurity

The U.S. government has released the NIST Framework for Improving Critical Infrastructure Cybersecurity, a set of voluntary standards designed to help companies in industries critical to the nation to defend against cyber threats. ESET experts comment.

Rob Waugh13 Feb 2014


Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Huge shortage of cyber-defenders as threat levels 'highest since records began', Cisco report warns

Cisco claims in its report that cybercrime is now a global, professional industry - and there is a worldwide shortage of professionals able to defend against such attacks, with new technologies in malware meaning that there is a shortfall of a million IT professionals.

Rob Waugh17 Jan 2014


ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

ESET’s Threat Trends Predictions 2014: The next battle for internet privacy, a new assault on Androids, and a new wave of hi-tech malware

The 2014 threat trends report from ESET's global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.

Rob Waugh17 Dec 2013


Why your small business needs an information security policy and a WISP

Why your small business needs an information security policy and a WISP

Why your small business needs an information security policy and a WISP

Information security policy can make a big difference for small business. Here we offer advice, resources, and a free recorded webinar on the subject to help your small firm beat the bad guys, and the competition.

Stephen Cobb04 Dec 2013


When malware goes bad: an historical sampler

When malware goes bad: an historical sampler

When malware goes bad: an historical sampler

A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?

Stephen Cobb30 Nov 2013


ESET response to Bits of Freedom open letter on detection of government malware

ESET response to Bits of Freedom open letter on detection of government malware

ESET response to Bits of Freedom open letter on detection of government malware

A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET's official response.

Andrew Lee11 Nov 2013