Phil Muncaster, ESET

Employee monitoring: Is ‘bossware’ right for your company?

While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees.

Mária Trnková named Chief Marketing Officer, will lead a newly formed division at ESET

ESET names Mária Trnková, previously Vice President for the Consumer and IoT Segment as its new marketing chief, heading up a newly-created Marketing, Communication and Digital Business unit.

2022 in review: 10 of the year’s biggest cyberattacks

The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022 from ESET.

RDP on the radar: An up‑close view of evolving remote access threats

Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol, courtesy of ESET’s Aryeh Goretsky.

Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap

What can organizations do to capitalize on the current fluidity in the job market in order to bring fresh cybersecurity talent into the fold?

Industroyer: A cyber‑weapon that brought down a power grid

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

The flip side of the coin: Why crypto is catnip for criminals

Cybercriminals continue to mine for opportunities in the crypto space – here’s what you should know about coin-mining hacks and crypto theft, courtesy of ESET.

The SMB cybercrime sweet spot: Small and medium in both size and protection

ESET examines why SMBs are desirable targets for cyberattacks, and what SMBs can do to protect themselves in this guest blog.

ESET Research webinar: How APT groups have turned Ukraine into a cyber‑battlefield

Ukraine has been under cyber-fire for years now – here’s what you should know about various disruptive cyberattacks that have hit the country since 2014

From the back office to the till: Cybersecurity challenges facing global retailers

How well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world.

Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022

data security

Be alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in 2022 from ESET’s We Live Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Protecting the hybrid workplace through Zero Trust security

The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors. Find out more in this ESET-sponsored blog.