-
Discover why cyber insurance is essential for comprehensive risk management in our interview with Arjan Halma, Managing Director Eye Underwriting.
-
Read our blog post about the impact of the new 'cybersecurity' directive, NIS2, on insurers.
-
The insurance market is now aware that cyber risk is difficult to manage and therefore difficult to insure. Read more in our blog.
-
Our cyber experts have analyzed over eleven thousand alerts from the past year. In this blog, we share the results of this analysis. Read more.
-
Improve your digital security in the new year with these cybersecurity resolutions. Protect your business from the growing threat of cyberattacks in 2023.
-
It is important to ensure that your company data is safe and secure. Minimize the risks with these five free tips.
-
Security Specialists from Eye Security have observed a rather large phishing campaign using a few interesting tactics that we would like to share.
-
At the 10th of May, our Security Operation Center got an alert about a blocked Powershell execution on an Exchange server at one of our new customers.
-
An antivirus programme alone will not protect your company against cybercrime. Read more
-
Sending a phishing email has a high chance of success, especially with new employees. Read our tips.
-
Discover how attackers are actively exploiting a remote code execution vulnerability found in the logging package log4j2 used in most Java applications.
-
Machine learning makes an important contribution to cybersecurity by recognizing patterns and thus detecting and preventing possible attacks.
-
Find out how cyber criminals use social engineering practices, with the goal of tricking employees into revealing important and sensitive information.
-
A zero day is an unresolved vulnerability in software. It can act as an unsealed gateway for cyber criminals to infiltrate corporate networks.
-
A common misconception is that not much can be done to combat ransomware attacks. Discover the methods used to deal with and prevent these attacks on time.
-
Find out through a specific case study, how cyberattacks can lead to liability conflicts between parties and a few tips on how to avoid these situations.
-
With numerous SMEs still disregarding the importance of a strong security system, here are a few steps on how to start creating a digitally secure base.
-
The ABUS Secvest wireless system is implemented by consumers and businesses. Discover how the vulnerability could be hacked or deactivated remotely.
-
Hackers are gradually becoming more sophisticated with their practices. Discover how Eye dealt with a ransomware attack from a certain "data doctor".
-
Wenn Sie ein Zyxel USG, ATP, VPN, ZyWALL oder USG FLEX haben, sollten Sie auf die neueste Version aktualisieren. Die Liste der betroffenen Geräte finden Sie in unserem Blog.