IN-HOUSE PREVENTION

How to communicate data security inside your company.

Impersonation Attacks Cover

Impersonation: When an Attacker Is Posing as the CEO

You have probably heard about social engineering – psychologically manipulating people into involuntarily revealing sensitive information. Let's take a look at impersonation, another non-technical attack technique used by cybercriminals to pretend to be trustworthy people while trying to manipulate others (e.g., to order and approve fraudulent transactions). How do you recognize when you are contacted by a cybercriminal instead of your colleague?

google drive security tips

Using Google Drive? Don't Risk Any Data Leaks

Cloud storage is quickly and easily accessible from almost any digital device with an internet connection. It's no wonder that this solution has become so popular among many companies. However, it can also pose a risk to your cybersecurity. Let's take a look at how to protect cloud storage on one of the most popular cloud storage providers – Google Drive.

social engineering how not to fall victim article

How Not to Fall Victim to Social Engineering

Humans are emotional beings, and social engineering is a very effective way to take advantage of that. What’s more, social engineering attacks such as phishing or spreading malicious links don’t usually require highly specific technical skills on the side of the attacker. Forcing thousands of users to give up sensitive information or perform harmful actions has so far proven to be rather easy! Don’t be fooled – even when your business is small, you might still become a target.

ESET-social-engineering-Sextoriton

Cyber blackmail and sextortion scams: What employees need to know

Blackmail is a common practice among cybercriminals. Although most of the threats are usually fake, many employees lack enough knowledge and are easily taken in. Therefore, it’s crucial to constantly raise awareness and talk about online scams – including sextortion.

Online_video_conferencing_platforms_cover

Cyberattacks on Videoconferencing Platforms: A New Trend That Escalated Quickly

The COVID-19 lockdowns forced millions of people to work from home. With skyrocketing numbers of users, video meeting programs like Zoom almost immediately became the target of hackers.

SMB_cybersecurity_risk_assessment_cover

Assessing Your Cyber Risk: How Vulnerable Are You?

Computers, mobile phones, printers, tablets and other smart gadgets. Servers, emails, social and Wi-Fi networks. Digital assets and smart devices have become an indispensable part of most companies. Want to stay one step ahead of cybercriminals? Find out which of these might be your weak point. All you need is a cyber risk assessment.

Passwords_cover

Why You Shouldn’t Pass on Passwords

Passwords were once reserved for secret agents and their criminal counterparts. These days, everybody uses passwords. In fact, most of us have too many to keep up with, which is why we often recycle the same ones for multiple purposes. But, only people in positions of power really need to worry about passwords, right?

phishing_high_season_fraudulent_emails_cover

It’s High Season for Phishing – Here’s How to Spot Fraudulent Emails Before They Cause Any Harm

Your employees have probably already received emails that appear to come from a bank or other popular online service, requesting that they “confirm” their account credentials or credit card number. This is a common phishing technique. Unfortunately, during the COVID-19 pandemic, we’ve seen once again that phishing lures are constantly changing – and they’re sometimes hard to recognize.