How to communicate data security inside your company.

Phishing Simulation_cover photo

How to Train Employees Using Phishing Simulation

Avoiding phishing attacks requires vigilance and the ability to recognize attacks – across your whole organization. So, how do you train your employees to spot them before it's too late? If your employees have already completed some form of cybersecurity training, try simulating a phishing attack – and give them a chance to choose the right solution.

Benefits of MDM_cover photo

5 Benefits of Mobile Device Management

Small and medium businesses are increasingly adopting more mobile solutions in response to the hybrid model of work and online tools that employees use daily. But to keep companies’ data secure, more needs to be done to protect smartphones and laptops from opening the way for cyberattacks. With mobile device management (MDM), IT experts can manage all devices regardless of which type of operating system they have.

Data backups and recovery_cover photo

Data backups & recovery: How can they save your business?

Why back up data if I've never lost any? Greg Bak, product development manager at data protection, backup and disaster recovery software vendor Xopero, often hears this question from businesses. "But the query should be put differently," Bak said. "Business owners should rather ask: If someone takes away my computer right now, would I be able to continue working and guarantee business continuity?" Many companies don't realize how dependent on digital data they actually are. Here are some of the insights he's shared to help you recognize the importance of regular data backups.

RDP_cover photo

A vector that can be misused by cybercriminals: How to protect your company from the risks related to RDP

Remote Desktop Protocol (RDP) has become an important tool for managing company networks in an era of hybrid workspaces. However, an unsecured RDP endpoint makes a vector that offers cybercriminals significant benefits when they attempt to attack your systems. What malicious activities might threat actors perform via RDP, and how do you prevent them from doing so?

How to plan a secure hybrid workspace_cover photo

How to plan a secure hybrid workplace

The Covid-19 pandemic has changed the working habits of people all over the world, as well as the way we perceive workplaces. Experts agree that the future of work is hybrid, combining teleworking and standard office work. The new model might bring new challenges for IT admins. How do we create a hybrid workplace that is both safe and effective?

None of us think we are ever going to get hacked_cover photo

None of us think we are ever going to get hacked

And that’s exactly why we’re so vulnerable to cyberattacks, says Jake Moore, an ESET cybersecurity specialist and a white hat hacker with 14 years of experience in digital forensics and cybercrime investigations. He never lacks motivation to scrutinize and test how small businesses perceive and handle cybersecurity. In most cases, the answer is: rather poorly.

Mobile security tips cover

6 Mobile Security Tips Every Employee Should Know

In most smaller companies, it’s the IT manager who is responsible for keeping company smartphones secured. While some security risks can be mitigated by endpoint protection, informing your employees about proper smartphone cyber hygiene is equally important.

How to Improve Cybersecurity Awareness

How Can You Improve Cybersecurity? Keep All Employees in the Loop

Building a cyber-aware culture should be a part of a long-term IT security strategy – in any company. In reality, however, companies often do not go beyond some form of basic cybersecurity training for employees. Of course, it's not possible to build such a culture in a day. But where should you start?