How to communicate data security inside your company.

ESET_cover photo_1300x736px_web security 3.png

Keeping your website up to date: What to watch out for

The online world changes constantly, and so do website security standards. How can you stay in the loop and fulfill the latest requirements? What should you consider when it comes to updating your website? Why systematically upgrade it at all? Here are a few tips from ESET Global Web Development Manager Martin Cambal that will help you stay on top of things and keep your online business presence sharp.

Siegeware_dont let hackers hijack your smart building_cover photo

Siegeware: Don't let hackers hijack your smart building

Have you ever heard of siegeware? This type of ransomware has been around for quite some time now, but is rarely discussed. Attacks on smart buildings are still far from common, but the ever-increasing number of ransomware attacks may change that. Learn more about siegeware and find out how to avoid this threat.

ESET phishing quiz employee awareness article

Quiz: How well do you know social engineering tactics?

Social engineering attacks are among the most common tactics cybercriminals use to attack small businesses, often leading to data breaches that can cause serious damage to a company. Are you aware of the most recent strategies used by cybercriminals? Take this quiz to test your knowledge of social engineering, then learn more by downloading our handbook (which contains the correct answers to this quiz).

6 easy tips on how to secure your business website_cover

6 easy tips on how to secure your business website

Poorly secured business websites may destroy your company’s trustworthiness and result in a loss of profits. How can you keep cybercriminals from interfering with your online presence and sales? Martin Cambal, ESET Global Web Development Manager, shared a few tips that will be useful for CEOs as well as IT admins in small businesses.

Ransomware series part2_cover

Ransomware: The many dangers of Remote Desktop Protocol

In the first part of this series, we gave a basic overview of ransomware and how it works. Now, we are delving deeper into the specific ways in which ransomware operators infiltrate your systems, starting with Remote Desktop Protocol.

Ransomware series part5_cover

Ransomware: A game of cat and mouse

In previous blogs we focused on how cybercriminals utilize vulnerabilities in Remote Desktop Protocol (RDP), email and supply chains to drop ransomware onto an organization’s systems. Although these are popular methods, they are by no means the only techniques used by those with malicious intent.

Ransomware series part6_cover

Ransomware: How to protect your company against attacks

Ransomware is one of the most potent threats to modern business, targeting organizations both large and small. To conclude our series exploring the various techniques used by cybercriminals to drop ransomware on corporate networks, we'll explore what organizations can do to ensure they can mitigate the risk.

Cyberinsurance_cover photo

Cyber insurance? Why you need to focus on cyber resilience first

In recent years, the risk of getting attacked by cybercriminals has been steadily increasing, and as a consequence, cyber insurance represents a progressively more popular measure to mitigate the financial impact of potential cyberattacks. Still, when it comes to protecting your company, cyber insurance needs to be accompanied by additional security measures. Building cyber resilience into your overall strategy will both increase protection and support business continuity.