top of page
Writer's pictureKillian ROUX

Eset - The B2C range is evolving




Our multi-platform security solutions for Individuals & VSEs have evolved! To find out more about the new products, we provide you with our new brochure. It will be the ideal medium to share with your customers the essence of the ESET brand, technology and offer.


To better protect against threats


IDENTITY THEFT

Cybercriminals are looking for confidential information (passwords, credit card numbers, social security numbers...), which they can use for illegal purposes (loans, online purchases, resale of data...). A serious crime with serious consequences for the victims.


ransomware

Ransomware is malicious software that can lock access to a device or encrypt its contents, with the aim of extorting money from you. Cybercriminals promise, with no guarantees of course, to restore access to your machine and affected data once the ransom is paid.


PHISHING

Phishing is a technique of impersonating a person or entity that you trust in order to extract sensitive or personal information from you. This most often takes the form of an email from your bank or other perfectly authentic-looking online service.


SPAM

Very common for decades (the first known spam dates back to 1978), spam is an email or any type of digital message that you did not request. Often irritating and boring, sometimes dangerous, you have to know how to guard against it.


INTRUSION

Intrusion consists of entering your network without authorization in order to take control of it and exploit the files and information stored on your devices. Protect yourself with an effective firewall and additional protections such as protection against Brute Force attacks


Adopt the right reflexes


Use unique, strong and complex passwords

Change the default passwords of the services you access

Use at least 12 characters including lowercase, uppercase, numbers and symbols


Secure access to your mobile devices and connected objects

Change the default identifiers of your connected objects

Only share access to your Wi-Fi with your loved ones


Beware of suspicious / fraudulent emails

Detect fake emails and file them in your spam folder

If you receive a message containing a link, position the mouse cursor (without clicking) on ​​this link to display the address to which it actually points


Do not distribute your personal information on the Internet

Manage your privacy settings so as not to disclose your private information (banking information, addresses, photos, etc.)

Remember to log out of your account on public computers


Apply updates to your devices and software

In general, version updates bring new features while fixing security vulnerabilities

Download your updates only from official sites


Make regular backups of your data

Remember to test your backups

In the event of loss, theft, breakdown, hacking or destruction of your digital devices, you will lose the data recorded on these media.

4 views0 comments

Recent Posts

See All

Comments


bottom of page