(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask. Enjoying life in the digital world comes at a cost: our privacy. Every website we visit, where we are, how much we spend, and what cards we’re paying with – this is just some of the information about you … More Virtual private networks: 5 common questions about VPNs answered
Small and medium businesses are increasingly adopting more mobile solutions in response to the hybrid model of work and online tools that employees use daily. But to keep companies’ data secure, more needs to be done to protect smartphones and laptops from opening the way for cyberattacks. With mobile device management (MDM), IT experts can … More 5 Benefits of Mobile Device Management
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders. Security by design has long been something of a holy grail for cybersecurity professionals. It’s a simple concept: ensure products are designed to be as secure as possible in order to minimize the chances of compromise further down the line. … More Phishing awareness training: Help your employees avoid the hook
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money. Coined during Al Capone’s times, the term ”money laundering” has since entered the general lexicon as criminals have been busy obscuring the source of their ill-gotten assets and making it appear as if the funds have come from … More Crypto mixers: What are they and how are they used?
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents? One of the key findings from the ESET Threat Report T1 2022 is that the Emotet botnet has risen, Phoenix-like, from the ashes, pumping out vast amounts of spam in … More How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security