5 tips for a cyber-secure home office experience

5 tips for a cyber-secure home office experience

If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack.Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two...
ESET launches Endpoint Antivirus for Linux

ESET launches Endpoint Antivirus for Linux

At ESET, we are always striving to provide the highest level of protection to everyone, whether you run a small business or a major enterprise. This is especially important in a compliance landscape where regulators require that endpoints have antimalware installed as...
Ransomware, a litmus test of enterprise preparedness

Ransomware, a litmus test of enterprise preparedness

Surveys and white papers consistently show that organizations identify ransomware breaches/attacks among their biggest security concerns. These often outweigh far more advanced threats like targeted attacks or cyber espionage that can go unnoticed for years, in which...
Relying on powerful malware research at ESET for your enterprise defenses

Relying on powerful malware research at ESET for your enterprise defenses

Malware research: the bedrock of ESET security products At ESET, we believe in building the excellence of our security software products and services firmly on our ongoing efforts into malware research. This research is crucial to reveal how malware behaves, even as...
Cybersecurity Tips & Tricks: Threat Hunters

Cybersecurity Tips & Tricks: Threat Hunters

You may hear security professionals talk about threat hunting. Just what do they mean?Organizations around the globe struggle to hire and retain the cybersecurity professionals needed to keep their organizations safe. In fact, statistics show that there are a growing...
Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

Version 3.0 of ESET Secure Authentication extends capabilities and introduces support for biometric authentication

With the rise of remote and flexible working, it is increasingly common for businesses and organizations to have a range of devices and environments they need to protect from cyber threats. This, combined with the fact that businesses of all sizes are facing a...