Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Much of the interest in Windows 8 focuses on cosmetic changes, such
as the new modern Windows 8 interface (formerly known as the Metro user interface) and replacement of the Start Menu
with the Start Screen, but substantial improvements have been made to Windows security, as well. Is it time for your business to go there?
To a small and medium-sized business (SMB), setting up a two-factor authentication system can be scary. There's extra hardware to buy and the maintenance could be a nightmare. However we will discuss why your company needs it and best practices for installation and use.
What do you know about Mac security threats? Does having the Mac platform in your business help you keep your network and data secure, or does it increase your chances of being hacked or attacked? Explore these Mac security questions and ask your own during this webcast.
It wasn't that long ago that most threats came from "mass market" malware. However attackers are now attacking with custom malware. The threat environment has been evolving, becoming more complicated, thus more difficult to deal with. To improve their ability to defend themselves security professionals need to understand the threat environment. This webinar will provide information on the existing threat environment - the players - the attacks - the goals - and the successes. In addition to the external factors it will look at the role of authorized users, the impact of social media, and how expanding devices have changed the threat profile.