POLICIES FIRST

All you need to know about regulations, mandatories and certification.

checking app security_cover.jpg

Checking an app’s security? Here are 8 things you shouldn’t forget

Before being installed and used by businesses or employees, any app should undergo a security check – be it translation apps, shared calendars, or messaging platforms. How should you make sure that the app is safe? Daniel Chromek, ESET’s Chief Information Security Officer, shared the most important questions any IT specialist should ask when determining an app’s security.

ESET_cover foto_1300x736px_online apps.jpg

7 types of apps that may endanger your data

How many apps do you have installed on your devices? We use apps for almost everything, from communication with others to writing down our shopping lists. However, some may be a threat to your data security and personal privacy. Together with Daniel Chromek, Chief Information Security Officer at ESET, we discuss common ways people endanger their data through app services.

How to prepare your company for a cyberattack_cover

How to prepare your company for a cyberattack

As the experts say, it's not a matter of if a cyberattack will happen, but when. Most companies underestimate the value of a detailed contingency plan that can help them react immediately to malware, phishing, DDoS attacks and other types of online threats. Such a plan can help you react promptly and limit the damage caused by such attacks.

Employee offboarding_cover

IT security needs to play a central role in employee offboarding

When employees leave a company, predefined IT and HR processes for so-called offboarding are usually taken for granted. The process often involves, for example, returning access cards or hardware – fairly mundane tasks. However, that is not the case with IT security, which tends to be neglected. Possible consequences? Threats to security and undesirable data leakage.

OSINT_cover photo

Open-Source Intelligence – Valuable source of information for IT specialists as well as attackers

The use of open-source intelligence (OSINT) is becoming increasingly important within IT security departments. OSINT includes the acquisition, collection, analysis and consolidation of information that is available from publicly available sources such as the internet. For this reason, OSINT is a valuable tool for finding exploitable vulnerabilities in networks, web apps, social media, etc.

ESET USA CCPA GDPR

GDPR vs. CCPA: How do they affect businesses across the US?

Many US companies are also active on the European market. Thus, doing business in the European Union and its regulatory landscape raises a lot of questions about the differences and similarities between two core privacy laws – the CCPA and the GDPR. Read the following comparison to quickly find your way around.

VPN-how-to-convince-CEO-invest

How to Convince Your CEO to Invest in a VPN

More employees working from home means more information shared online, so creating an encrypted tunnel via a virtual private network (VPN) is a wise move. As an IT manager, you most likely know all about VPNs. However, that might not be the case for your boss, who controls the budget. If your CEO lacks the time to understand why some security measures for IT infrastructure are necessary, read on. We're sharing some basic arguments for investing in a VPN solution that might save you some endless debates.

VPN-why-use-network

Why Use a VPN Today? Key Benefits of Employing a Virtual Private Network

Usually, using a VPN in a company is nothing new for IT admins. Times have changed, however – and so has the path to effective security: It's no longer just about the in-house technology and devices. The rise of remote work and accelerated digitalization have made the VPN even more relevant. Here’s what the VPN gives you in return.