Implementing two-factor authentication adds an extra layer of defense that protects against compromised usernames and passwords. Adding this extra protection using employee smartphones as the “second…
Endpoint and email security for the BYOD era needs fixing as the consumerization of IT means businesses have more endpoints to protect. ESET’s email and endpoint security solutions provide the…
The ESET Whitepaper, "Cyber Security Roadmap for Businesses," details cyber security steps so that risks are determined, policy and corresponding policy enforcement can be identified, controls can be…
ESET’s whitepaper covering Windows 8.1 details the system’s evolutionary encryption, its Windows Defender advancements and new potential risks, ultimately concluding that the system is an upgrade for…
As usual for the end of the year, ESET Latin America’s Research Laboratory has written ESET‘s annual threat trends report, which addresses several subjects in Information Security. the aim of this…