IN-HOUSE PREVENTION

How to communicate data security inside your company.

Assessing your cyber-resilience: Why a cyber-risk audit makes you stronger

Computers, mobile phones, printers, tablets, servers, emails, and Wi-Fi networks: Digital assets and smart devices have become indispensable to most companies. As a result, businesses need to consider these factors and...

Energy prices and cybersecurity: Drawing the connections

The abrupt increase in energy prices is currently a topic for many businesses. But while thinking of lowering your power consumption and saving money, don’t forget about cybersecurity, too. After all, these two topics are...

IT burnout prevention? Focus on small talk and openness, says the ESET HR director

Due to the digital security talent shortage, hiring IT experts has become a challenge for many businesses. In many cases, their current workforce must manage excessive workloads. This, along with other factors like...

What is the link between digital well-being and cybersecurity?

As an IT specialist, it will not surprise you that many cyberattacks rely on human error rather than software security. People may be aware of the best digital hygiene practices, but when they get tired and have trouble...

What you should know about ransomware and phishing as a service

Many types of threats have become available as a service, which makes it possible even for those without sufficient technical knowledge to cause cyberattacks. Here is everything you should know to stay safe from...

Why and how should you care about your IT manager’s digital well-being?

The IT industry is currently running on about two-thirds of the human resources it needs. Due to this shortage of capacities, the risk of burnout is high. Many IT teams now work under huge amounts of stress and are...

No password is strong enough. Learn about brute force attacks.

When we try to protect our data from cybercriminals, there is one shield we should all use: passwords. Safeguarding private data, banking details, sensitive files, and more, passwords are a key that criminals desire to obtain...

Beguiled by festive mood: Social engineering simulation test

If you came to work and saw a Christmas party poster enticing you to scan a QR code to get a “thrilling surprise,” would you cheerfully reach for your phone? If so, you swallowed the bait. Read more about the case of one...