-
Discover why cyber insurance is essential for comprehensive risk management in our interview with Arjan Halma, Managing Director Eye Underwriting.
-
Cyber attacks and data breaches are inevitable. Download our infographic to learn how to act on a cyber incident.
-
Test your cyber security response capabilities regularly with this checklist and sync them with your incident response plan.
-
Contain and recover from an immediate cyber incident with Eye Security's Incident Response. Download our brochure to learn more about Incident Response.
-
Limit the impact of cyber threats by adding 24/7 security operations. Download our brochure to learn more about Managed XDR.
-
Read our blog post about the impact of the new 'cybersecurity' directive, NIS2, on insurers.
-
Insure your business against the financial loss due to cyber-attacks and data breaches. Download our brochure to learn more about Eye Cyber Insurance.
-
The insurance market is now aware that cyber risk is difficult to manage and therefore difficult to insure. Read more in our blog.
-
Our cyber experts have analyzed over eleven thousand alerts from the past year. In this blog, we share the results of this analysis. Read more.
-
Don't Underestimate the Vulnerability of Your SME to Cyber Attacks: Stay Informed with Our Infographic on the State of Cyber Security. Download Now.
-
Improve your digital security in the new year with these cybersecurity resolutions. Protect your business from the growing threat of cyberattacks in 2023.
-
Cyber risk is seen as one of the biggest threats to businesses.
-
It is important to ensure that your company data is safe and secure. Minimize the risks with these five free tips.
-
Security Specialists from Eye Security have observed a rather large phishing campaign using a few interesting tactics that we would like to share.
-
Manufacturer KeyTec Netherlands reduces cyber risk with 24/7 monitoring from Eye Security
-
At the 10th of May, our Security Operation Center got an alert about a blocked Powershell execution on an Exchange server at one of our new customers.
-
An antivirus programme alone will not protect your company against cybercrime. Read more
-
Sending a phishing email has a high chance of success, especially with new employees. Read our tips.
-
Eye Security spoke to the founder of a large transport company. Read more about our solution to reduce the risk of a cyber attack at Van der Most Transport.
-
Cybercrime is a threat to the continuity of companies in the manufacturing industry. Signature Foods chose Eye for their IT security. Read their story.
-
Discover how attackers are actively exploiting a remote code execution vulnerability found in the logging package log4j2 used in most Java applications.
-
Machine learning makes an important contribution to cybersecurity by recognizing patterns and thus detecting and preventing possible attacks.
-
Find out how cyber criminals use social engineering practices, with the goal of tricking employees into revealing important and sensitive information.
-
A zero day is an unresolved vulnerability in software. It can act as an unsealed gateway for cyber criminals to infiltrate corporate networks.
-
A common misconception is that not much can be done to combat ransomware attacks. Discover the methods used to deal with and prevent these attacks on time.
-
Find out through a specific case study, how cyberattacks can lead to liability conflicts between parties and a few tips on how to avoid these situations.
-
With numerous SMEs still disregarding the importance of a strong security system, here are a few steps on how to start creating a digitally secure base.
-
The ABUS Secvest wireless system is implemented by consumers and businesses. Discover how the vulnerability could be hacked or deactivated remotely.
-
Hackers are gradually becoming more sophisticated with their practices. Discover how Eye dealt with a ransomware attack from a certain "data doctor".
-
Wenn Sie ein Zyxel USG, ATP, VPN, ZyWALL oder USG FLEX haben, sollten Sie auf die neueste Version aktualisieren. Die Liste der betroffenen Geräte finden Sie in unserem Blog.