Work from home: How to set up a VPN

As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks. If you’re newly working from home because of the COVID-19 outbreak, you probably have to learn some new tools and tricks very quickly now. Here we look at virtual private network (VPN) technology. … More Work from home: How to set up a VPN

Fraud Prevention Month: How to protect yourself from scams

ESET Chief Security Evangelist Tony Anscombe sat down with us to share his insights on how to avoid falling prey to online fraud. Are you aware of some of the most common tactics that con artists can use to steal your data, identity and money? The digital era has opened new ways for scammers to … More Fraud Prevention Month: How to protect yourself from scams

Digital addiction: How to get your children off their screens

What are some of the common signs that your children may be screen addicts and what can you do to limit their screen time? Children, just like adults, tend to spend a little too much time on their phones. Who can blame them? We, grown-ups, often do that ourselves, after all. However, sometimes ‘a little … More Digital addiction: How to get your children off their screens

How to catch a cybercriminal?

What is it like to defeat cybercrime? Have a peek into how computer forensics professionals help bring cybercriminals to justice. Many people ask me about what it was like working for law enforcement. More often than not, however, they are actually enquiring about how computer crime is truly investigated. Whether it’s questions about how accurately … More How to catch a cybercriminal?

Connected cars: How to improve their connection to cybersecurity

As software becomes more important than ever, how can engaging the security industry make the road ahead less winding? Here at CES, the car manufacturers race to launch the latest gadgets in their new models before the competition. And that’s hard to do without breaking down the software silos. That would mean using widely developed, open-source … More Connected cars: How to improve their connection to cybersecurity