Staying ahead of all the threats.

Insider threats are evolving in parallel with the work environment_cover

Insider threats are evolving in parallel with the work environment

Insider threats – an issue that endangers sensitive company data. While many businesses focus on protecting themselves from external dangers, incidents triggered by employees make up more than half of data loss cases. Richard Brulík, CEO of Safetica, which offers Data Loss Prevention (DLP) solutions, introduces the phenomenon of insider threats in detail.

The benefits of having a DLP solution_cover

The benefits of having a data loss protection (DLP) solution

Protecting your company from external threats has become an essential practise among businesses of all sizes. But when it comes to data leaks, 40-60% of the incidents are caused by internal actors. Employing a data loss protection (DLP) solution can help you respond to the risks related to data security. Read more and learn how DLP software benefits your company.

ESET_cover foto_1300x736px_RANSOMWARE_NEW.jpg

Ransomware Security Tips for SMBs (+Downloadable eBook)

SMBs are becoming increasingly attractive targets for ransomware attacks. Why? Because these businesses accumulate more valuable data than individual consumers and, at the same time, they often lack the robust security measures employed by large corporations or institutions.

Classify, organize and protect your data_safetica_cover

Classify, organise, and protect your data

Do you know how to categorise various types of data? Can you describe the differences between data loss, leak, and breach? And can you guess what data is the most vulnerable to security incidents? Read on and find out.


Machine learning: How does it help IT admins (and hackers too)?

Artificial intelligence (AI) and machine learning (ML) are part of one of the most discussed topics in IT. When it comes to digital security, some hope they will one day provide the ultimate protection against malware, while others fear their promise might give way to more sophisticated cyberattacks. Both perspectives are correct.

Ransomware series part4_cover

Ransomware: The need to protect the weakest link

So far in our ransomware series, we have looked at the basics of ransomware, Remote Desktop Protocol and email compromises . In this blog, we take a step back and look at how businesses can be attacked through their supply chains.

Ransomware series part3_cover

Ransomware: How to provide a valuable layer of protection to email

As we discussed in our blog exploring Remote Desktop Protocol, today, ransomware is rife and has been exacerbated by the current work-from-home trend. While the bad guys use many attack vectors to attempt to infiltrate your systems and plant ransomware, the most popular – by far – is email.

Ransomware series part1_cover

What should SMBs know about ransomware

Ransomware is one of the biggest threats to businesses today, and with new attacks hitting the news on a daily basis, the risk can seem overwhelming. But what actually is ransomware, and how can businesses protect themselves? In this series, we will take an in-depth look at ransomware, highlighting specific methods of attack such as email compromise, vulnerabilities and the Remote Desktop Protocol, delving into supply chain attacks, and giving advice on how businesses can mitigate the risk .