Tech Briefs

  • ESET Secure Authentication and Compliance

    The need to conform with regulatory, governance, compliance or audit standards is a requirement for most companies doing business in today's dynamic corporate world.

  • Image of a hole in a brick wall

    5 ways to protect your systems from exploits

    With the rising tides of ransomware eating up much of the newsfeeds, we are also being reintroduced to an accompanying friend of malware: exploits. While they are different, the two can seemingly go...

  • Image of computer graphic with padlock

    The 5 Most Common Reasons for Corporate Data Loss

    There is no doubt that one of the main assets of a company is the data it stores. Information about its customers, financial or employee planning,among other types of records, should be adequately...

  • Quick guide to the EU General Data Protection Regulation

    The General Data Protection Regulation (GDPR) replaces the EU’s 1995 Data Protection Directive 95/46/EC. The GDPR has been developed to strengthen and unify online privacy rights and data protection...

  • Image of lock on laptop

    RoT: Ransomware of Things

    One of the trends that I found most worrying in 2016 was the willingness of some humans to participate in the following three activities at scale: hold computer systems and data files hostage...

  • Tech Brief Icon

    Security Solutions for Finance & Banking

    Spend more time focusing on the needs of your financial institution and clients - and less time worrying about security issues.