Latest Articles

Compliance and Regulations

GDPR vs. CCPA: How do they affect businesses across the US?

GDPR vs. CCPA: How do they affect businesses across the US?

Compliance and Regulations

GDPR vs. CCPA: How do they affect businesses across the US?

This quick guide breaks down the key differences and similarities to help you stay compliant on both sides of the Atlantic.

Editorial Team01 Jun 2021


Prevention and Awareness

Want to build a cyber-aware culture? Find a way to pass on knowledge without scaring employees

Want to build a cyber-aware culture? Find a way to pass on knowledge without scaring employees

Prevention and Awareness

Want to build a cyber-aware culture? Find a way to pass on knowledge without scaring employees

Cybersecurity training isn’t a one-and-done deal. Like cramming for a test, if you don’t use it, you lose it. Ongoing education keeps your team sharp — and your business safer.

Editorial Team24 May 2021


Identity and Data Protection

How to back up your company’s data: From prevention to recovery

How to back up your company’s data: From prevention to recovery

Identity and Data Protection

How to back up your company’s data: From prevention to recovery

Prevention is always cheaper than recovery, hence backups play an important role in keeping companies running.

Editorial Team27 Apr 2021


Threat landscape

Impersonation: When an attacker is posing as the CEO

Impersonation: When an attacker is posing as the CEO

Threat landscape

Impersonation: When an attacker is posing as the CEO

How do you recognize when you are contacted by a cybercriminal instead of your colleague?

Editorial Team05 Apr 2021


Threat landscape

Microsoft Exchange exploits – step one in ransomware chain

Microsoft Exchange exploits – step one in ransomware chain

Threat landscape

Microsoft Exchange exploits – step one in ransomware chain

Once attackers gain a foothold on web servers, there are all manner of nasty tricks and malware they can leverage immediately or put into play later – like ransomware.

Aryeh Goretsky29 Mar 2021


Threat landscape

How menacing are the latest trends in ransomware?

How menacing are the latest trends in ransomware?

Threat landscape

How menacing are the latest trends in ransomware?

Ransomware is a top threat for small and mid-sized businesses. Even if you know the risks, attackers are relentless — targeting databases, servers, and smartphones. One weak spot is all it takes.

Editorial Team23 Mar 2021


Threat landscape

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

Threat landscape

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

Before ESET shone the light on a slew of APT groups exploiting vulnerabilities in Exchange servers around the world, a smaller number were using zero days in targeted attacks – leading CISOs to reconsider their security approach.

Rene Holt18 Mar 2021


Identity and Data Protection

How to convince your CEO to invest in a VPN

How to convince your CEO to invest in a VPN

Identity and Data Protection

How to convince your CEO to invest in a VPN

More remote work means more data flowing online — making a VPN essential. As an IT manager, you get it. But if your CEO doesn’t, here are simple reasons to help make the case (and save you the debate).

Editorial Team25 Feb 2021


Identity and Data Protection

Why use a VPN today? Key benefits of employing a virtual private network

Why use a VPN today? Key benefits of employing a virtual private network

Identity and Data Protection

Why use a VPN today? Key benefits of employing a virtual private network

With remote work and digitalization on the rise, VPNs are more crucial than ever.

Editorial Team23 Feb 2021


Prevention first cybersecurity as a service
ESET Resource Center for Business
Your reliable source of educative and enriching digital content