ESET Virtualization security solutions for business banner

Tech Briefs

  • BYOD Policy: Security Implementation Guide

    When I was a child, I wanted nothing more than the tablet device that Penny, the character in Inspector Gadget had. You could read on it, use it as a computer, the functionality was limitless. Fast...

  • 5 Tips for Safe Summer Travels

    When you’re on vacation with the family this summer, your kids are bringing along all of their friends. Not literally, of course, but more than likely they’ll be using their smartphones to stay in...

  • THE ART OF LOSING (YOUR DATA)

    Netflix. Target. LinkedIn. MySpace. Company brands that we are all familiar with. And they all have one thing in common: data loss due to breaches in the company’s security. Some attacks were a result...

  • Security audits: what is your game plan?

    There’s a lot of confusion about how to perform a security audit and what it entails. Some people think that in order to have a secure infrastructure, all you need to do is install antivirus software...

  • The 5 things you need to do to protect yourself from ransomware

    Family photos and videos. Tax returns and other financial records. Business documents. Think about everything that you keep on your computer. What would happen if it all was stolen from you?

  • Encryption’s in the news—but what is it?

    Encryption has become an increasingly hot topic in the last few months—most recently, with Apple’s refusal to help the FBI unlock an iPhone that belonged to one of the shooters in the San Bernardino...