SECURITY INSIGHT BLOG

Welcome to emt technology blog.
World Backup Day – without data where would we be now?

World Backup Day – without data where would we be now?

Covid-19, and the subsequent lockdowns, has proven just how data-dependent we are. Millions of people are now working from home and if it wasn't for the internet and data, economies the world over would crash spectacularly. Data allows us to withdraw cash from ATMs,...

read more
World Backup Day – without data where would we be now?

World Backup Day – without data where would we be now?

Covid-19, and the subsequent lockdowns, has proven just how data-dependent we are. Millions of people are now working from home and if it wasn't for the internet and data, economies the world over would crash spectacularly. Data allows us to withdraw cash from ATMs,...

read more
5 steps and one-click for securing your new home office

5 steps and one-click for securing your new home office

To securely and sanely manage your new home office, it’s time to ask yourself a question: Are you in the first or second group of home workers? With the coronavirus/COVID-19 virus raging outside, there are two basic groupings of people working from inside their home...

read more
10 CMDB TOOLS YOU NEED TO CONSIDER IN 2020

10 CMDB TOOLS YOU NEED TO CONSIDER IN 2020

If you’re striving to adhere to the ITIL framework, you know that configuration management is a key component of success. It’s the heart of ITIL best practices, which is why Configuration Management Database (CMDB) tools are so important for your organization. A CMDB...

read more
5 tips for a cyber-secure home office experience

5 tips for a cyber-secure home office experience

If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack.Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two...

read more
The Cybersecurity Risks Of Remote Employees Working From Home

The Cybersecurity Risks Of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers. For years, companies have been gravitating towards new policies on the acceptance of remote employees. In...

read more
Remote Work, Data Protection and Compliance during the COVID-19 Crisis

Remote Work, Data Protection and Compliance during the COVID-19 Crisis

With the COVID-19 virus now officially declared a pandemic by the World Health Organization, companies around the world have encouraged their employees to work from home to protect their health and support government measures aimed to curb the spread of the...

read more
ESET launches Endpoint Antivirus for Linux

ESET launches Endpoint Antivirus for Linux

At ESET, we are always striving to provide the highest level of protection to everyone, whether you run a small business or a major enterprise. This is especially important in a compliance landscape where regulators require that endpoints have antimalware installed as...

read more
Like a champion – top tips for working from home

Like a champion – top tips for working from home

As increasing numbers of people work from home because of the Coronavirus, BullGuard provides top tips to help you maintain your professional poise and manage your time so you can keep your balance and avoid burning out. Will it be tea (or coffee) and biscuits, the...

read more
Data protection – the most important task now and in the future

Data protection – the most important task now and in the future

This post is also available in: German Data loss and theft, manipulation of data by outsiders who gain control over devices or systems, business interruptions, and extortion are all data protection related issues that are causing grave concern amongst IT,...

read more
10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

10 REASONS YOU SHOULD INVEST IN APPLICATION DEPENDENCY MAPPING

As businesses increasingly invest in technology and undertake digital transformation initiatives, the complexity and growth of the IT environment have exploded. Traditional methods for managing and keeping inventory of infrastructure are now out of date....

read more
Configure ‘Break Glass’ Emergency Access For Azure Active Directory

Configure ‘Break Glass’ Emergency Access For Azure Active Directory

In cloud computing generally and in Microsoft Azure specifically, the shared responsibility model means that both Microsoft and you (the customer) have a role to play in ensuring service high availability. Let's take identity, for example, Microsoft provides...

read more
IT Spending by Industry

IT Spending by Industry

In the Flexera 2020 State of Tech Spend report, we identified IT spending by industry across financial services, retail, healthcare, software, services, hosting, industrial and consumer products, transportation and logistics. We gathered IT spending data from...

read more
Adding Custom Vulnerability Checks to Your Acunetix Installation

Adding Custom Vulnerability Checks to Your Acunetix Installation

This document describes how to extend an Acunetix On-Premise installation with custom vulnerability checks. Even though a default installation of Acunetix already includes thousands of carefully crafted vulnerability checks, users with specific requirements and...

read more