The pandemic has highlighted the need for businesses to act with alacrity and prepare for the long haul – and to do so with cybersecurity in mind. The technology industry abounds with buzzwords and phrases, with digital transformation being one such term that many companies aspire to undertake; but when faced with reality it can … More Digital transformation could be accelerated by COVID‑19
A view of the Q1 2020 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts. The first quarter of 2020 was, without a doubt, defined by the outbreak of COVID-19 – now a pandemic that has put much of the world under lockdown, disrupting people’s lives … More ESET Threat Report
While in France, a citizen of Brazil who resides in California books a bungee jump in New Zealand. Is it a leap of faith into the unknown, for both the operator and the thrill-seeker? The internet has created truly global markets for businesses that would have once remained local and may have struggled to reach … More Is “global privacy” an oxymoron?
In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact the continuity of business activities in an organization. Attackers have many means to infiltrate companies. However, many attacks, don’t require a very high level of technological sophistication. Instead, techniques like targeted social … More Hacking and targeted cyber-attacks as a result of anti-competitive practices in business
Smart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure. If, unlike enterprise customers, you don’t have six figures to spend, what are some things you can do to protect your data that can scale as your business grows? Even if you don’t plan on scaling to an … More 5 personal (and cheap) data privacy tools that scale for business
Many companies are ranking cybersecurity as a top 5 priority but their actions do not measure up to the claim, a survey finds. The hard truth that companies must face is that there is no way that cybersecurity risk can be fully eliminated. On the other hand, there are steps that organizations can take to … More Do companies take cybersecurity seriously enough?
File-less malware attacks leave little trace, which makes them all the more threatening. A file-less malware attack doesn’t even need to install software on a victim’s machine and is instead based on an attacker taking control of something already installed on your computer. A file-less malware attack often latches onto a built-in component of Windows … More What exactly is a file-less malware attack and how could it affect your business?