Corporate Blog

  • Social Engineering and Why It Happened to You

    In June of 2015, nearly 22 million records of prospective and current federal employees were lost. These included items like fingerprints, personal information, even mental health records. The...

  • How I Found Success as a Woman in Cybersecurity

    In 2016, ESET launched its first Women in Cybersecurity Scholarship, which awards $2,500 to a female student who aspires to a career in cybersecurity. Our inaugural winner, Chelsie Power, is an...

  • HIPAA Compliance: Four essential steps

    HIPAA (Health Insurance Portability and Accountability Act) compliance is one of those things that must be done, similar to tying one’s shoelaces. You could avoid it and likely get from point A to...

  • Why World Backup Day is a Big Deal for Businesses

    We all know our data should be protected. And it’s obvious that one such protection method—the ability to quickly restore data from a backup method—should be a high priority. But backing up data...

  • Don’t Be Held Hostage by Ransomware: How to Stand Up to Cryptowall

    In the last few years, it is hard to talk about computer security without the word “Cryptowall” being brought up. In February, Hollywood Presbyterian Medical Center was hit by this strain of...

  • New from ESET: Agentless solution for virtual environments

    With the launch of ESET Virtualization Security, ESET now offers an agentless approach to securing your virtual environments in addition to our agent-based solution. Both provide powerful protection,...