PROTECTION MATTERS

Staying ahead of all the threats.

DSG_cover foto_1300x736px_ESET WORLD insights 2022.jpg(1)

Digital security: Trends and challenges of 2022

How has the war in Ukraine affected the current digital security landscape? What are the biggest challenges companies face in terms of cybersecurity? How can you develop your digital resilience and awareness in 2022? These are some of the pressing issues discussed by experts at the annual ESET World conference, held May 31-June 1, 2022, in Malta. Read some of the highlights from the event and learn what the experts have to say.

ESET_cover foto_1300x736px_Analysys Mason.jpg(1)

What is the outlook for IT in SMBs?

A recent survey by Analysys Mason describes the current situation and future plans of small and medium businesses across four countries: Germany, Singapore, the UK and the US. The analysis focuses on the influence of the pandemic on the surveyed group of SMBs, the new and continuing challenges that the businesses face, and their prospects for the upcoming months. Why are businesses investing more money in IT? And how do they plan to make remote work safer and more productive? Find out what the trends are in the SMB segment and what you can learn from them.

Insider threats are evolving in parallel with the work environment_cover

Insider threats are evolving in parallel with the work environment

Insider threats are a major danger to your sensitive company data. While many businesses focus on protecting themselves from external attacks, incidents triggered by employees make up more than half of data loss cases. Richard Brulík, CEO of Safetica, which offers Data Loss Prevention (DLP) solutions, introduces the phenomenon of insider threats in detail.

The benefits of having a DLP solution_cover

The benefits of having a data loss protection solution

Protecting your company from external threats has become an essential practice among businesses of all sizes. But when it comes to data leaks, 40-60% of the incidents are caused by internal actors. Employing a data loss protection (DLP) solution can help you respond to the risks related to data security. Learn why a DLP solution benefits organizations of all sizes.

Classify, organize and protect your data_safetica_cover

Classify, organize, and protect your data

Do you know how to categorize various types of data? Can you describe the differences between data loss, data leak, and data breach? And can you guess what data is the most vulnerable to security incidents? Read on and find out.

Header-Image_Machine-learning_DE_1300x736

How machine learning helps IT admins (and hackers, too)

Artificial intelligence (AI) and machine learning (ML) are two of the most discussed topics in IT. When it comes to digital security, some hope they will one day provide the ultimate protection against malware, while others fear their promise might give way to more sophisticated cyberattacks. Both perspectives are correct.

Ransomware series part1_cover

Ransomware: What SMBs should know

Ransomware is one of the biggest threats to businesses today, and with new attacks hitting the news on a daily basis, the risk can seem overwhelming. But what actually is ransomware, and how can businesses protect themselves? In this series, we will take an in-depth look at ransomware, highlighting specific methods of attack such as email compromise, vulnerabilities and the Remote Desktop Protocol, delving into supply chain attacks, and giving advice on how businesses can mitigate the risk .

Ransomware series part3_cover

Ransomware: How to provide a valuable layer of protection to email

As we discussed in our blog exploring Remote Desktop Protocol, ransomware is on the rise, and has been exacerbated by the current work-from-home trend. While the bad guys use many attack vectors to attempt to infiltrate your systems and plant ransomware, the most popular – by far – remains email.