Digital security guide logo
  • Policies first
  • PROTECTION MATTERS
  • IN-HOUSE PREVENTION



Policies first

8 types of apps that may endanger your data

PROTECTION MATTERS

Computer-generated boss: How do deepfakes work?

Android malware detections grew by 57%. What else is revealed in the latest ESET Threat Report?

Policies first

All you need to know about regulations, mandatories and certification.

8 types of apps that may endanger your data

How many apps do you have installed on your devices? Nowadays, we use apps for almost everything, from communication with others to writing down our shopping lists. However, some apps may represent a hidden danger to your...


NIS2: Understanding the new EU cybersecurity directive

Employees as the first line of defense against threats: How to develop a human firewall

More about Policies

PROTECTION MATTERS

Staying ahead of all the threats.

Computer-generated boss: How do deepfakes work?

If you were on a Zoom call and your executive told you, eye to eye, to perform a financial transaction, would you stop to think about whether the person on your screen is real? Since deepfakes – images or recordings that...


Managed detection and response (MDR): Is it suitable for your business?

Free guide: How to set up an effective cybersecurity strategy

More about Data Protection

IN-HOUSE PREVENTION

How to communicate data security inside your company.

Assessing your cyber-resilience: Why a cyber-risk audit makes you stronger

Computers, mobile phones, printers, tablets, servers, emails, and Wi-Fi networks: Digital assets and smart devices have become indispensable to most companies. As a result, businesses need to consider these factors and...


Energy prices and cybersecurity: Drawing the connections

IT burnout prevention? Focus on small talk and openness, says the ESET HR director

More from In-house Prevention

Most Read

No password is strong enough. Learn about brute force attacks.

When we try to protect our data from cybercriminals, there is one shield we should all use: passwords. Safeguarding private data, banking details, sensitive files, and more, passwords are a key that criminals desire to obtain...

Why should you care about your IT team’s wellbeing?

The IT industry is currently running on about two-thirds of the human resources it needs. Due to this shortage of capacities, the risk of burnout is high amongst IT workers. Many IT teams now work under huge amounts of stress...

Free guide: How to set up an effective cybersecurity strategy

In most cases, SMBs only have a limited workforce that takes care of digital security strategy, if any at all. Therefore, they must focus on the biggest threats and invest their energy into substantial areas for their...

Don’t let yourself get cyber-blackmailed – Get to know spyware

Spyware, stalkerware, bossware – you may have heard about some of the different types of malicious software that can be installed on your device to track your activity and turn your device into a “mic.” Does such...

EsetProtect_Banner_HP.jpg

Subscribe

Keep your journey safe with more digital security related content.

Your subscription was successful.

For more information concerning personal data processing visit our Privacy Policy

ESET logo
  • Policies first
  • PROTECTION MATTERS
  • IN-HOUSE PREVENTION
  • Contact
  • Privacy
  • Terms and conditions
  • Manage Cookies
  • TwitSter
  • Linkedin
  • Facebook
© 2023 ESET, spol. s r.o. - All rights reserved
eset-footer-logo

Subscribe

Keep your journey safe with more digital security related content.

Your subscription was successful.

For more information concerning personal data processing visit our Privacy Policy