From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in...
Was your Amazon account hacked? Here’s what you need to do

Was your Amazon account hacked? Here’s what you need to do

Amazon stands for huge selection, fair prices and good service. This is where you go shopping when everything should be as smooth, fast and easy as possible. But with the popularity of Amazon, the security risks are also growing. More and more hackers try to crack...
Simple social media steps to help small businesses get back on top in the post-pandemic landscape

Simple social media steps to help small businesses get back on top in the post-pandemic landscape

The post-Covid-19 business landscape is slowly taking shape. The continued observation of social distancing is a must, shoppers are filtering back to the high street and businesses are taking the first tentative steps towards some sense of normality. However, there...
ESET supports the fight against hatred and misinformation on social networks

ESET supports the fight against hatred and misinformation on social networks

The recent launch of the Stop Hate for Profit campaign has raised a great deal of awareness in the public forum about the problem of online content that promotes racism, hate, violence and, especially, false information. In our work to make the internet safer for...