PROTECTION MATTERS

Staying ahead of all the threats.

Computer-generated boss: How do deepfakes work?

If you were on a Zoom call and your executive told you, eye to eye, to perform a financial transaction, would you stop to think about whether the person on your screen is real? Since deepfakes – images or recordings that...

Managed detection and response (MDR): Is it suitable for your business?

There has been a lot of buzz in the IT community about XDR (extended detection and response) solutions, which use behavioural analytics across endpoints, networks, cloud, email, and other layers to spot suspicious activity...

Free guide: How to set up an effective cybersecurity strategy

In most cases, SMBs only have a limited workforce that takes care of digital security strategy, if any at all. Therefore, they must focus on the biggest threats and invest their energy into substantial areas for their...

2023 Cybersecurity trends: zoomed in on SMBs

In the dynamic world of digital security, each year is filled with rapid developments and unclear expectations of what’s to come in the future. How will the rise of collaboration apps affect business security? And do social...

Train your employees on how to browse the internet safely

Many employees will have access to work-related apps and files on their personal devices, possibly because their company encourages a BYOD (Bring Your Own Devices) policy, for example. Therefore, following certain security...

Don’t let yourself get cyber-blackmailed – Get to know spyware

Spyware, stalkerware, bossware – you may have heard about some of the different types of malicious software that can be installed on your device to track your activity and turn your device into a “mic.” Does such...

The state of phishing in 2022

You might believe that phishing is an old issue that everyone knows about, unfortunately the threat continues to evolve. In order to stay protected, it pays to be aware of the new trends. What does phishing look like in 2022...

Five things you should know about wiper attacks

Imagine having all your company’s data wiped out for good… For most, this is a scenario from one of their worst nightmares. This spring’s wiper attacks in Ukraine, uncovered by ESET Research, show how quickly this...