And it doesn’t require much more than downloading a dedicated app. Last year, Google made it possible for most Android users to use their phone as a physical security key for their Google accounts. Fast forward a few months and most iPhone users receive the same option. According to Google’s blog post yesterday, the feature was introduced with an … More You can now turn your iPhone into a Google security key
As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid for a more secure 2020. Denying you are a target You’ve probably already brushed off this possibility with contempt, thinking the chances … More ESET’s 20 cybersecurity tips for 2020
The second authentication factor might be a minor inconvenience, but it provides a major security boost. With past years riddled with security breaches, it is high time we evaluated the way we secure our online presence. The usual way to secure most of your digital accounts is by using a password, no question about it. … More 2FA: Double down on your security
These passwords may win the popularity contest but lose flat out in security. Year after year, analyses show that millions of people make, to put it mildly, questionable choices when it comes to the passwords they use to protect their accounts. And fresh statistics for the year that is drawing to a close confirm that … More The worst passwords of 2019: Did yours make the list?
As users are losing access to their accounts by the dozens, we offer a few tips to help keep your streaming subscriptions safe. The long-awaited streaming service Disney+ was launched to the cheers of many. But it wasn’t without technical issues; in addition, within hours of the service going online many users were reporting that … More Disney+ accounts hacked – How to protect yourself
An ESET-commissioned survey among enterprises also shows that while respondents in most countries agree on the need to bolster cyber-defenses, some are reluctant to adopt cybersecurity solutions. As technology evolves by leaps and bounds every year, so does the threat landscape and bad actors keep coming up with new threats. That’s not scaremongering, it’s a … More Can regulations improve cybersecurity? In APAC, opinions vary
No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to respond to evolving threats such as crypto-jacking and ransomware attacks, small and medium-sized enterprises (SMEs) don’t … More Keeping your business safe