Latest Articles

Prevention and Awareness

Better to protect than rebrand: Why web security matters.

Better to protect than rebrand: Why web security matters.

Prevention and Awareness

Better to protect than rebrand: Why web security matters.

Have you ever considered that your website might be a business risk?

Editorial Team17 May 2022


Cybersecurity Protection

Shields up!

Shields up!

Cybersecurity Protection

Shields up!

Is there such a thing as too much protection? Let’s consult Sci-Fi lore for guidance.

James Shepperd03 May 2022


Threat landscape

Is your company website an easy target for hackers?

Is your company website an easy target for hackers?

Threat landscape

Is your company website an easy target for hackers?

Your website is your digital storefront — make sure it’s secure. With 30,000 sites hacked daily, knowing the common attack types is key.

Editorial Team29 Apr 2022


Device Protection

Every Moment Secured on Your Android

Every Moment Secured on Your Android

Device Protection

Every Moment Secured on Your Android

Our mobile phones are an undeniable part of our lives in the 21st century. We use them to contact our nearest and dearest, check the news, access the internet, make online purchases and even log into accounts, ideally via multi-factor authentication (MFA). Using MFA can block up to 99% of automated attacks. Undeniably, MFA is important for safe mobile use; however, have you ever thought about which types of MFA are riskiest and why?

Alžbeta Kovaľová25 Apr 2022


Endpoint Security and XDR

Protecting small businesses with multiple layers of defense

Protecting small businesses with multiple layers of defense

Endpoint Security and XDR

Protecting small businesses with multiple layers of defense

What technologies and actions should cybersecurity admins at small businesses consider?

Tony Anscombe22 Apr 2022


Identity and Data Protection

IT security needs to play a central role in employee offboarding

IT security needs to play a central role in employee offboarding

Identity and Data Protection

IT security needs to play a central role in employee offboarding

Offboarding often covers badges and laptops — but what about cybersecurity? Skipping IT security steps can lead to data leaks and serious risks. Don’t let the last step become your weakest link.

Editorial Team20 Apr 2022


Prevention and Awareness

How to train employees using phishing simulation

How to train employees using phishing simulation

Prevention and Awareness

How to train employees using phishing simulation

Already done basic phishing training? Take it further: Run a phishing simulation and see who’s ready to respond.

Editorial Team12 Apr 2022


Family Safety Online

An entertainer, or a new bully. What are deepfakes and how to talk about them with kids?

An entertainer, or a new bully. What are deepfakes and how to talk about them with kids?

Family Safety Online

An entertainer, or a new bully. What are deepfakes and how to talk about them with kids?

Deepfakes can be both entertaining, but also terrifying, and as we approach an age where nothing's certain, how do we make sure that our kids are aware of a deepfake's real power?

Alžbeta Kovaľová11 Apr 2022


Endpoint Security and XDR

Firewall: Why use it to protect your business?

Firewall: Why use it to protect your business?

Endpoint Security and XDR

Firewall: Why use it to protect your business?

Developed in the late 1980s, a firewall was one of the first security measures protecting internet users. But how, exactly, do they work?

Editorial Team07 Apr 2022


MDR & Services

5 benefits of mobile device management

5 benefits of mobile device management

MDR & Services

5 benefits of mobile device management

With mobile device management (MDM), IT experts can manage all mobile devices regardless of which type of operating system they have.

Editorial Team28 Mar 2022


Cybersecurity Protection

Addicted to the news? Doomscrolling through reality

Addicted to the news? Doomscrolling through reality

Cybersecurity Protection

Addicted to the news? Doomscrolling through reality

Doomscrolling can not only be psychologically damaging, but also abused by cybercriminals.

Alžbeta Kovaľová18 Mar 2022


Identity and Data Protection

How to Find the Right Backup and Recovery Software

How to Find the Right Backup and Recovery Software

Identity and Data Protection

How to Find the Right Backup and Recovery Software

The more data your company stores and depends on, the greater the need to back it up.

Editorial Team09 Mar 2022


Prevention first cybersecurity as a service
ESET Home Security