IN-HOUSE PREVENTION

How to communicate data security inside your company.

None of us think we are ever going to get hacked_cover photo

None Of Us Think We'll Ever Get Hacked

And that’s exactly why we’re so vulnerable to cyberattacks, says Jake Moore, an ESET Cybersecurity Specialist and a white hat hacker with 14 years of experience in digital forensics and cybercrime investigations. He never lacks the motivation to scrutinise and test how small businesses perceive and handle cybersecurity. In most cases, the answer is: rather poorly.

How to Improve Cybersecurity Awareness

How Can You Improve Cybersecurity? Keep All Employees in the Loop

Building a cyber-aware culture should be a part of a long-term IT security strategy – in any company. In reality, however, companies often do not go beyond some form of basic cybersecurity training for employees. Sure, it is not possible to build such a culture in a day. But where should you start?

Mobile security tips cover

6 Mobile Security Tips Every Employee Should Know

In most smaller companies, it’s the IT manager who holds watch over company smartphones. If that's the case for your business, keep in mind that smartphones have security risks too. Some of them can be defused via endpoint protection; however, informing employees about proper smartphone cyber hygiene is equally important.

Cyber-aware culture Interview with Daniel Chromek

Want to Build a Cyber-Aware Culture? Find a Way to Pass on Knowledge Without Scaring Employees

Cybersecurity education may be similar to taking an exam. First, you learn something, and if you do not use your knowledge for a long time, you forget it. That might be the effect of cybersecurity training for employees, which takes place once or twice a year and then continues with occasional presentations that no one understands.

Impersonation Attacks Cover

Impersonation: When an Attacker is Posing as the CEO

You have probably heard about social engineering – psychologically manipulating people into involuntarily revealing sensitive information. Let's take a look at impersonation, another non-technical attack technique used by cybercriminals pretending to be trustworthy people while trying to manipulate others (eg. to order and approve fraudulent transactions). How can you recognise when you're being contacted by a cybercriminal instead of your colleague?

social engineering how not to fall victim article

How Not to Fall Victim to Social Engineering

Humans are emotional beings, and social engineering is a very effective way to take advantage of that. What’s more, social engineering attacks don’t usually require highly specific technical skills on the side of the attacker. Forcing thousands of users to give up sensitive information or perform harmful actions has so far proven to be rather easy! Don’t be fooled – even when your business is small, you might still become a target.

google drive security tips

Using Google Drive? Don't Risk Any Data Leaks

Cloud storage is quickly and easily accessible from almost any digital device with an internet connection. It's no wonder that this solution has become so popular among many companies. However, it can also pose a risk to your cybersecurity. Let's take a look at how to protect cloud storage on one of the most popular cloud storage providers – Google Drive.

ESET-social-engineering-Sextoriton

Let’s Talk About Sextortion: What Every Employee Should Know

Blackmail is a common practice among cybercriminals. Although most of the threats are usually fake, many employees lack enough knowledge and are easily taken in. Therefore, it’s crucial to constantly raise awareness and talk about online scams – including sextortion.