Cybersecurity Tips & Tricks: Threat Hunters

Cybersecurity Tips & Tricks: Threat Hunters

You may hear security professionals talk about threat hunting. Just what do they mean?Organizations around the globe struggle to hire and retain the cybersecurity professionals needed to keep their organizations safe. In fact, statistics show that there are a growing...
Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

With the rise of remote and flexible working, it is increasingly common for businesses and organizations to have a range of devices and environments they need to protect from cyber threats. This, combined with the fact that businesses of all sizes are facing a...
The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

In the early days of the internet, it was quite common for local networks to run their own domain name service (DNS). DNS was invented as a solution for allowing internet users to query remote servers via friendly, easy-to-remember names like google.com. Names are...
Automating tasks means streamlining timelines and security for MSPs

Automating tasks means streamlining timelines and security for MSPs

While the world worries about a growing diversity of cyberattacks, any business worth its salt knows there are even more risks out there, such as the loss or theft of company devices, which can result in serious data privacy violations. Company devices that get out...
The hidden threat of data theft: Keeping small businesses safe

The hidden threat of data theft: Keeping small businesses safe

As the digital threat landscape evolves and businesses and their data are increasingly targeted by cybercriminals, it can be easy to focus on malware when taking steps to protect your business. While malware is still a vital consideration in the fight against...
Gaming with ESET’s Advanced Machine Learning protection ‘on’

Gaming with ESET’s Advanced Machine Learning protection ‘on’

Even before the rise of online gaming, LAN parties, in which gamers create an offline network for multiplayer adventures, have offered constant appeal. From basement setups to fully organized events around the world, like DreamHack, optimizing your gaming gear for...