It's A Jungle Out There... We Can Help!

Why ESET Antivirus

Client Portal

ESET is here to secure your computers and devices, protect your precious family pictures and data, or keep your company know-how safe. We protect users just like you across 200 countries and territories worldwide, helping them to use and explore all the great opportunities of the Internet. We are proud that so many individuals and companies trust us to…

Read More

Hack on Government Agencies

CISA's alert

US: Hack on Government Agencies Goes Beyond SolarWinds Users The alert from the Cybersecurity and Infrastructure Security Agency (CISA) also warns that removing the hackers from compromised systems won’t be easy. UPDATE: Microsoft was also hacked, according to Reuters, citing unnamed sources. The company’s own software tools were then used to attack other victims. However, Microsoft President Brad Smith is denying the report. Original story:…

Read More

Biggest threat to industrial control systems since Stuxnet

As your IT security provider, we wanted to update you on some recent breaking news. ESET has discovered a new malware strain designed specifically to target industrial control systems-such as electric power grids. The malware, detected by ESET as Win32/Industroyer, is believed to have been used in the December 2016 attack on Ukraine’s power grid that caused a major…

Read More

So What Is Malware

So what is malware? It comes in a bewildering variety of forms. Computer viruses are probably the most familiar type of malware so named because they spread by making copies of themselves. Worms have a similar property. Other types of malware, such as spyware, are named for what they do: In the case of spyware, it transmits personal information,…

Read More

Top 10 Online Threats

The strategies hackers use to break into your site can be complicated but the results are usually pretty simple; lost revenue. Here are the 10 most common threats identified by the Open Web Application Security Project: 1. Injection. It’s not uncommon for web applications to have injection flaws, especially SQL injection flaws. A hacker who finds one will send…

Read More