How to communicate data security inside your company.

How to plan a secure hybrid workspace_cover photo

How to plan a secure hybrid workplace

The Covid-19 pandemic has changed the working habits of people all over the world, as well as the way we perceive workplaces. Experts agree that the future of work is hybrid, combining teleworking and standard office work. The new model might bring new challenges for IT admins. How do we create a hybrid workplace that is both safe and effective?

None of us think we are ever going to get hacked_cover photo

None of us think we are ever going to get hacked

And that’s exactly why we’re so vulnerable to cyberattacks, says Jake Moore, an ESET cybersecurity specialist and a white hat hacker with 14 years of experience in digital forensics and cybercrime investigations. He never lacks motivation to scrutinize and test how small businesses perceive and handle cybersecurity. In most cases, the answer is: rather poorly.

Mobile security tips cover

6 Mobile Security Tips Every Employee Should Know

In most smaller companies, it’s the IT manager who is responsible for keeping company smartphones secured. While some security risks can be mitigated by endpoint protection, informing your employees about proper smartphone cyber hygiene is equally important.

How to Improve Cybersecurity Awareness

How Can You Improve Cybersecurity? Keep All Employees in the Loop

Building a cyber-aware culture should be a part of a long-term IT security strategy – in any company. In reality, however, companies often do not go beyond some form of basic cybersecurity training for employees. Of course, it's not possible to build such a culture in a day. But where should you start?

Cyber-aware culture Interview with Daniel Chromek

Want to Build a Cyber-Aware Culture? Find a Way to Pass on Knowledge Without Scaring Employees

Cybersecurity education could be compared to taking an exam. You learn something to prepare for the test, but if you don't use that knowledge again for a long time, you forget it. This is often the case with cybersecurity training for employees, which takes place once or twice a year. Education should be an ongoing process for best results.

Impersonation Attacks Cover

Impersonation: When an Attacker Is Posing as the CEO

You have probably heard about social engineering – psychologically manipulating people into involuntarily revealing sensitive information. Let's take a look at impersonation, another non-technical attack technique used by cybercriminals to pretend to be trustworthy people while trying to manipulate others (e.g., to order and approve fraudulent transactions). How do you recognize when you are contacted by a cybercriminal instead of your colleague?

google drive security tips

Using Google Drive? Don't Risk Any Data Leaks

Cloud storage is quickly and easily accessible from almost any digital device with an internet connection. It's no wonder that this solution has become so popular among many companies. However, it can also pose a risk to your cybersecurity. Let's take a look at how to protect cloud storage on one of the most popular cloud storage providers – Google Drive.

social engineering how not to fall victim article

How Not to Fall Victim to Social Engineering

Humans are emotional beings, and social engineering is a very effective way to take advantage of that. What’s more, social engineering attacks such as phishing or spreading malicious links don’t usually require highly specific technical skills on the side of the attacker. Forcing thousands of users to give up sensitive information or perform harmful actions has so far proven to be rather easy! Don’t be fooled – even when your business is small, you might still become a target.