Staying ahead of all the threats.

DSG_cover foto_1300x736px_ESET WORLD insights 2022.jpg(1)

Digital security: Trends and challenges of 2022

How has the war in Ukraine affected the current digital security landscape? What are the biggest challenges companies face in terms of cybersecurity? How can you develop your digital resilience and awareness in 2022? These are some of the pressing issues discussed by experts at the annual ESET World conference, held May 31-June 1, 2022, in Malta. Read some of the highlights from the event and learn what the experts have to say.

ESET_cover foto_1300x736px_Analysys Mason.jpg(1)

What is the outlook for IT in SMBs?

A recent survey by Analysys Mason describes the current situation and future plans of small and medium businesses across four countries: Germany, Singapore, the UK and the US. The analysis focuses on the influence of the pandemic on the surveyed group of SMBs, the new and continuing challenges that the businesses face, and their prospects for the upcoming months. Why are businesses investing more money in IT? And how do they plan to make remote work safer and more productive? Find out what the trends are in the SMB segment and what you can learn from them.

Insider threats are evolving in parallel with the work environment_cover

Insider threats are evolving in parallel with the work environment

Insider threats are a major danger to your sensitive company data. While many businesses focus on protecting themselves from external attacks, incidents triggered by employees make up more than half of data loss cases. Richard Brulík, CEO of Safetica, which offers Data Loss Prevention (DLP) solutions, introduces the phenomenon of insider threats in detail.

The benefits of having a DLP solution_cover

The benefits of having a data loss protection solution

Protecting your company from external threats has become an essential practice among businesses of all sizes. But when it comes to data leaks, 40-60% of the incidents are caused by internal actors. Employing a data loss protection (DLP) solution can help you respond to the risks related to data security. Learn why a DLP solution benefits organizations of all sizes.

Classify, organize and protect your data_safetica_cover

Classify, organize, and protect your data

Do you know how to categorize various types of data? Can you describe the differences between data loss, data leak, and data breach? And can you guess what data is the most vulnerable to security incidents? Read on and find out.


How machine learning helps IT admins (and hackers, too)

Artificial intelligence (AI) and machine learning (ML) are two of the most discussed topics in IT. When it comes to digital security, some hope they will one day provide the ultimate protection against malware, while others fear their promise might give way to more sophisticated cyberattacks. Both perspectives are correct.

Ransomware series part4_cover

Ransomware: The need to protect the weakest link, your supply chain

So far in our ransomware series, we have looked at the basics of ransomware, Remote Desktop Protocol and email compromises. In this blog, we take a look at how businesses can be attacked through their supply chains.

Ransomware series part3_cover

Ransomware: How to provide a valuable layer of protection to email

As we discussed in our blog exploring Remote Desktop Protocol, ransomware is on the rise, and has been exacerbated by the current work-from-home trend. While the bad guys use many attack vectors to attempt to infiltrate your systems and plant ransomware, the most popular – by far – remains email.