• How ESET protects you from today's advanced malware threats

    According to AV-TEST, an independent IT security organization that tracks the global distribution of malware, there were more than 140 million brand-new variants created in 2014. This represents a 75%…

  • Cryptolockers and other filecoders

    Ransomware is any malware (malicious software) used by cyber criminals to hold digital files on smartphones, computers and other connected devices for ransom, demanding payment in order to regain…

  • Multilayered security: ESET's proactive defense against modern malware

    According to the 2015 Verizon Data Breach Investigations Report, there were nearly 80,000 security incidents reported during 2014—a 25% increase over the previous year. It’s a better time than ever to…

  • Seven Sinkholes that swallow IT's time

    As someone who works in network security, I’ve worked closely with plenty of IT teams. It’s given me a front row seat into the issues that unnecessarily use up valuable IT resources that could be used…

  • The Five New PCI Compliance Rules You Need to Know

    If your business accepts credit or debit cards, then you know that PCI DSSstands for Payment Card Industry Data Security Standard, often referred to simply as PCI. This security standard applies to…

  • Securing your virtual environment

    Implementing antivirus and other endpoint security measures in virtual environments is often characterized as a trade-off between performance and security. Broadly speaking, there are two approaches: