Latest Cybersecurity Articles

Privacy and Identity Protection

Staying Connected When We Have to Be Apart: ESET’s Video Calling Guide

Staying Connected When We Have to Be Apart: ESET’s Video Calling Guide

Privacy and Identity Protection

Staying Connected When We Have to Be Apart: ESET’s Video Calling Guide

Video calling has become essential for work and education, and as such has become a growing target for cyber threats.

Editorial Team 01 Oct 2020


Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

ESET is one of the top referenced and engaged vendors directly involved in refinement and population of the MITRE ATT&CK knowledge base.

Rene Holt 11 Aug 2020


Identity and Data Protection

A hacker stole my life. And I got it back.

A hacker stole my life. And I got it back.

Identity and Data Protection

A hacker stole my life. And I got it back.

Follow the story of Xander Koppelmans as he tells the tale of his company's struggles, including a cyberattack that costed him almost everything.

Editorial Team 11 Aug 2020


Endpoint Security and XDR

How to create a secure and productive remote office

How to create a secure and productive remote office

Endpoint Security and XDR

How to create a secure and productive remote office

When a crisis hits, be ready to switch to teleworking. That is just one of the lessons COVID-19 has taught companies all around the world. Remote working should go hand in hand with extra cybersecurity measures – here’s how to achieve them.

Editorial Team 10 Aug 2020


Identity and Data Protection

Why are encryption and MFA essential for your business?

Why are encryption and MFA essential for your business?

Identity and Data Protection

Why are encryption and MFA essential for your business?

If you want to avoid data breaches, use two-factor authentication and encryption on all devices.

Editorial Team 07 Aug 2020


Device Protection

Take 5: Essential steps to improve your mobile cyber hygiene

Take 5: Essential steps to improve your mobile cyber hygiene

Device Protection

Take 5: Essential steps to improve your mobile cyber hygiene

The key to cyber hygiene is being proactive.

Editorial Team 30 Jul 2020


Endpoint Security and XDR

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

Endpoint Security and XDR

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

The COVID-19 lockdowns forced millions of people to work from home. With skyrocketing numbers of users, video meeting programs like Zoom almost immediately became the target of hackers.

Editorial Team 30 Jul 2020


Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

Handling computer security incidents with a 4-phase incident response plan can help build your CSIRT's confidence to bring your business back to normal operations after an attack.

Rene Holt 23 Jul 2020


Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

The continued threat of nation-state attacks: Australia under the gun

Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

No tool serves better than an endpoint detection and response tool like ESET Enterprise Inspector to gain comprehensive and immediate visibility into possibly compromised endpoints.

Rene Holt 13 Jul 2020


Cybersecurity Protection

Top five lessons we’ve learned in lockdown

Top five lessons we’ve learned in lockdown

Cybersecurity Protection

Top five lessons we’ve learned in lockdown

Have the right tools and increase your awareness.

Editorial Team 06 Jul 2020


Identity and Data Protection

Encryption as a must: How to find the right solution for your business

Encryption as a must: How to find the right solution for your business

Identity and Data Protection

Encryption as a must: How to find the right solution for your business

Have you tried to deploy an encryption product but failed? Don’t give up. Even one stolen phone can jeopardize your business.

Editorial Team 05 Jun 2020


Identity and Data Protection

7 reasons for small businesses to take action on cybersecurity

7 reasons for small businesses to take action on cybersecurity

Identity and Data Protection

7 reasons for small businesses to take action on cybersecurity

Think your business is too small to be hacked? Think again. Small and mid-sized companies are often the easiest targets.

Editorial Team 05 Jun 2020


Prevention first cybersecurity as a service
ESET Home Security