IN-HOUSE PREVENTION

How to communicate data security inside your company.

social engineering how not to fall victim article

How Not to Fall Victim to Social Engineering

Humans are emotional beings, and social engineering is a very effective way to take advantage of that. What’s more, social engineering attacks don’t usually require highly specific technical skills on the side of the attacker. Forcing thousands of users to give up sensitive information or perform harmful actions has so far proven to be rather easy! Don’t be fooled – even when your business is small, you might still become a target.

google drive security tips

Using Google Drive? Don't Risk Any Data Leaks

Cloud storage is quickly and easily accessible from almost any digital device with an internet connection. It's no wonder that this solution has become so popular among many companies. However, it can also pose a risk to your cybersecurity. Let's take a look at how to protect cloud storage on one of the most popular cloud storage providers – Google Drive.

ESET-social-engineering-Sextoriton

Let’s Talk About Sextortion: What Every Employee Should Know

Blackmail is a common practice among cybercriminals. Although most of the threats are usually fake, many employees lack enough knowledge and are easily taken in. Therefore, it’s crucial to constantly raise awareness and talk about online scams – including sextortion.

Cyberchology Header V4

Cyberchology: The Human Element of Cybersecurity

Stress affects different personality types in different ways, meaning each individual employee has their own specific blind spot when it comes to cybersecurity. In light of the COVID-19 pandemic, ESET and The Myers-Briggs Company release Cyberchology – The Human Element, a brand new report investigating the link between cybersecurity, personality and stress.

SMB_cybersecurity_risk_assessment_cover

Assessing Your Cyber Risk: How Vulnerable Are You?

Computers, mobile phones, printers, tablets and other smart gadgets. Servers, emails, social and Wi-Fi networks. Digital assets and smart devices have become an indispensable part of most companies. Want to stay one step ahead of cybercriminals? Find out which of these might be your weak point. All you need is a cyber risk assessment.

Passwords_cover

Why You Shouldn’t Pass on Passwords

Passwords were once reserved for secret agents and their criminal counterparts. These days, everybody uses passwords. In fact, most of us have too many to keep up with, which is why we often recycle the same ones for multiple purposes. But, only people in positions of power really need to worry about passwords, right?

phishing_high_season_fraudulent_emails_cover

It’s High Season for Phishing – Here’s How to Spot Fraudulent Emails Before They Cause Any Harm

Your employees have probably already received emails seemingly coming from a bank or other popular online service, requesting that they “confirm” their account credentials or credit card number. This is a common phishing technique. Unfortunately, during the COVID-19 pandemic, we’ve seen once again that phishing lures are constantly changing – and they’re sometimes hard to recognise.

Online_video_conferencing_platforms_cover

Cyberattacks on Videoconferencing Platforms: A New Trend That Escalated Quickly

The COVID-19 lockdowns forced millions of people to work from home. With skyrocketing numbers of users, video meeting programs like Zoom almost immediately became the target of hackers.