Staying ahead of all the threats.

Why web security matters_cover photo

Better to protect than rebrand: Why web security matters.

Websites are sometimes referred to as the “shop windows” of the digital era for a good reason. They have the power to positively influence the way customers view your company or product, help create the perfect first impression, or build trust in your service. Or, they can do quite the opposite, especially when poorly secured. Have you ever considered that your website might be a business risk?

Company website as target for hackers_cover photo

Is your company website an easy target for hackers?

Your company’s website is like the store window of a brick-and-mortar shop. Its design is crucial for your customers and partners, and you need to keep it safe. Yet globally, around 30,000 websites are hacked daily. Here's a guide to common types of attacks.

Finding the right backup and recovery_cover photo

How to Find the Right Backup and Recovery Software

The more data your company stores and depends on, the greater the need to back it up.

MSP Alliance Interview with Charles Weaver

Choosing an MSP: How to make a well-informed decision

For every size and type of company, there is a managed service provider (MSP) that can take care of its cybersecurity. “Whether you’re an NGO, a car dealership, or a gaming studio, an MSP can help you focus on your core competencies, while they take care of the day-to-day agenda, like monitoring firewalls and security logs,” explains Charles Weaver, co-founder and CEO of the MSPAlliance, which unites more than 30,000 MSPs worldwide. Who better to take advice from if you want to take the security of your business seriously? Here are some of his tips.

How to Choose Mobile Security Provider cover

7 Things to Consider When Choosing a Mobile Security Provider

There are many mobile security apps out there, each offering a different set of features. To choose the right one, you first need to decide what your company´s priorities are. Find out how key features can help mitigate threats to company mobiles.

Unexpected Dangers for Small Businesses_cover photo

Unexpected Dangers for Small Businesses

Office recycling bins, USB drives, unwatched computers, social media profiles. Those are some of the possible weak spots hackers can use to harm small businesses. ESET cybersecurity expert Jake Moore regularly sets off into the field and investigates such hidden dangers that SMBs might not be aware of. Here are some of his experiences.

Illicit Cryptomining. How can cybercriminals misuse your devices_cover photo

Illicit cryptomining. How can cybercriminals misuse your devices?

High processor activity, unusual energy consumption and reduced productivity of your infrastructure. These are some of the signs that your company devices might have been misused for cryptomining. How can you prevent cryptominers from getting into your network? And why should you even care?

macOS security_cover photo

Do Apple’s macOS devices need security software?

When it comes to cybersecurity, macOS is seen by many as a role model. Some Apple fans might even view their fruit-labeled computer as immune to attacks by cybercriminals, with Apple itself considering built-in macOS security measures adequate for the threats targeting it. But is it really bulletproof?