Is your personal data all over the internet? 7 steps to cleaning up your online presence

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps. Have you ever searched for yourself on Google? It may sound odd, but it is actually a great way to discover a tiny part of what the web knows about us. And, … More Is your personal data all over the internet? 7 steps to cleaning up your online presence

Virtual private networks: 5 common questions about VPNs answered

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask. Enjoying life in the digital world comes at a cost: our privacy. Every website we visit, where we are, how much we spend, and what cards we’re paying with – this is just some of the information about you … More Virtual private networks: 5 common questions about VPNs answered

Introducing ESET NetProtect: Fighting threats at the DNS level

The DNS, the internet’s address book, has long been plagued by malicious domains with little hope for effective recourse against this abuse by its bookkeepers: the registrars. ESET brings its protective technology to bear on this issue. Since the early 1980s, the Domain Name System (DNS) has been used for looking up the Internet Protocol … More Introducing ESET NetProtect: Fighting threats at the DNS level

Putting cybersecurity first: Why secure‑by‑design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom. From headline-grabbing stories of ransomware to personal experiences of identity theft, cyber is increasingly finding its way into collective consciousness. During the pandemic, an escalation in threat levels also reminded IT and business leaders what’s … More Putting cybersecurity first: Why secure‑by‑design must be the norm

Protecting the hybrid workplace through Zero Trust security

The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors. The post-pandemic normal for global organizations increasingly means using digital technology to support more flexible working practices. Although tech giants such as Twitter and Facebook made headlines by promising some employees they can work from home forever, … More Protecting the hybrid workplace through Zero Trust security