And it doesn’t require much more than downloading a dedicated app. Last year, Google made it possible for most Android users to use their phone as a physical security key for their Google accounts. Fast forward a few months and most iPhone users receive the same option. According to Google’s blog post yesterday, the feature was introduced with an … More You can now turn your iPhone into a Google security key
As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid for a more secure 2020. Denying you are a target You’ve probably already brushed off this possibility with contempt, thinking the chances … More ESET’s 20 cybersecurity tips for 2020
The second authentication factor might be a minor inconvenience, but it provides a major security boost. With past years riddled with security breaches, it is high time we evaluated the way we secure our online presence. The usual way to secure most of your digital accounts is by using a password, no question about it. … More 2FA: Double down on your security
These passwords may win the popularity contest but lose flat out in security. Year after year, analyses show that millions of people make, to put it mildly, questionable choices when it comes to the passwords they use to protect their accounts. And fresh statistics for the year that is drawing to a close confirm that … More The worst passwords of 2019: Did yours make the list?
What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
An ESET-commissioned survey among enterprises also shows that while respondents in most countries agree on the need to bolster cyber-defenses, some are reluctant to adopt cybersecurity solutions. As technology evolves by leaps and bounds every year, so does the threat landscape and bad actors keep coming up with new threats. That’s not scaremongering, it’s a … More Can regulations improve cybersecurity? In APAC, opinions vary
Some tips that businesses can do to get better at it without breaking the bank. Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored, but that’s no … More RSA – IoT security meets SMB