From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in...
A new chapter for DLP: CoSoSys announces Endpoint Protector Enterprise

A new chapter for DLP: CoSoSys announces Endpoint Protector Enterprise

Our powerful, flexible and highly scalable Data Loss Prevention (DLP) solution package is on the way, addressing the risks of data loss and compliance of enterprise clients. We at CoSoSys are aware that in the age of digital...
Why the COVID-19 pandemic has been a blessing for scammers

Why the COVID-19 pandemic has been a blessing for scammers

In case we needed any more proof, the COVID-19 pandemic has shown us once again just how ruthless scammers are. While people across the world have united to look after those around them in this time of emergency, hackers and malicious actors have shown no sign of...
Medical company turns to BullGuard Small Office Security for robust protection against ransomware

Medical company turns to BullGuard Small Office Security for robust protection against ransomware

Medservicegroup is a Ukrainian company that supplies and installs medical equipment. Like all companies, it is fundamentally dependent on an IT infrastructure to manage back office and front office processes and support remote working. And also like many other...
Version 1.4 of the ESET Enterprise Inspector: What’s new?

Version 1.4 of the ESET Enterprise Inspector: What’s new?

In 2018, ESET launched ESET Enterprise Inspector (EEI), a sophisticated Endpoint Detection & Response (EDR) tool that monitors endpoint activity for suspicious processes and executables, and triggers alarms based on specific rules. EDR tools are a vital component...