{"id":100493,"date":"2024-12-28T16:59:20","date_gmt":"2024-12-28T08:59:20","guid":{"rendered":"https:\/\/version-2.com\/?p=100493"},"modified":"2024-12-23T17:02:22","modified_gmt":"2024-12-23T09:02:22","slug":"delivering-business-security-with-extended-prevention","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/12\/delivering-business-security-with-extended-prevention\/","title":{"rendered":"Delivering business security with extended prevention"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"100493\" class=\"elementor elementor-100493\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c11198008\" class=\"frame frame-default frame-type-text frame-layout-0\"><div id=\"content-c11219867\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg\" alt=\"\" width=\"250\" height=\"250\" \/><\/p><\/div><div id=\"content-c11219869\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Essential security can take care of most threats \u2013 but for businesses with larger networks, it might be time to extend the security envelope.<\/p><p>We\u2019ve written before about how <a href=\"https:\/\/www.eset.com\/blog\/business\/what-is-fileless-malware-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">multilayered security<\/a> is key to protection success. Each layer represents a dimension of protection, tackling specific threats or attack vectors.\u00a0<\/p><p>The best security solution should tackle all of this behind the scenes, only requiring human attention during setup, audits, or incidents. Security should be comprehensive, yes, but not too complicated, worsening the protective power of security operations.<\/p><p class=\"alert\">To learn how complicated security tools can impact a business&#8217;s cybersecurity protection, read our blog on <a href=\"https:\/\/www.eset.com\/blog\/business\/attention-alert-fatigue-can-result-in-severe-burnout\/\" target=\"_blank\" rel=\"noopener\">alert fatigue-induced burnout<\/a>.<\/p><p>Moreover, the larger such an operation is, the harder it is to cover. Thankfully, some measures can alleviate such issues easily \u2013 such as automatic extended protection.<\/p><\/div><div id=\"content-c11219870\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">What do we mean by extended protection?<\/h3><\/header><p>Let\u2019s start from the bottom \u2013 the core of a security operation: endpoint protection, covering computers, mobile devices, and servers. Such points of convergence between users and digital networks are prime targets for threat actors, necessitating constant safeguarding.<\/p><p>Baseline endpoint protection should serve the smallest businesses, but larger ones might find that this is just not enough to cover their use of various cloud and mail apps, authentication, or a potential cyber insurance ask in the form of advanced encryption. Furthermore, larger businesses also require advanced threat defenses, somewhere beyond stand-alone endpoint security. This could be a protective sandbox set up to catch any incoming malicious samples, such as zero-day threats, before they hit the endpoint itself, or vulnerability and patch management to take care of exploitable gaps before they become an issue.<\/p><p>At ESET, we call all this extended protection \u2013 as it extends beyond endpoint security, adding additional protective layers, extending prevention efforts.<\/p><\/div><div id=\"content-c11219871\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Why should a business want extended security tech?<\/h3><\/header><p>The easy answer to why a business should seek extended protection is that their involvement in commerce is enough of an incentive for threat actors to have them in their sights. Based on <a href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2022\/03\/30\/cyber-criminals\/\" target=\"_blank\" rel=\"noopener\">various reports<\/a>, cracking the security of SMBs and larger businesses is the most likely goal rather than well-defended enterprises (a business with fewer than 100 employees could face 350% more attacks than enterprises).<\/p><p>Ransomware, a threat likely faced by every business entity, has seen a 32% rise in H1 2024 compared to H2 2023, based on <a href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-threat-report-h12024.pdf\" target=\"_blank\" rel=\"noopener\">ESET threat telemetry<\/a>, with most detections present in the US, Mexico, the UK, and Germany.<\/p><p><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/EP_Ransomware_global_telemetry.png\" alt=\"\" width=\"726\" height=\"359\" \/><\/p><div id=\"content-c11219873\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Moreover, similar trends are seen in remote desktop protocol (RDP) password-guessing attempts (a rise of 33%), with numerous detections in additional countries like the US, Brazil, Spain, France, Italy, Germany, Czechia, and Poland. Shockingly, despite numerous return-to-office mandates, the now common use of RDP for remote employees in hybrid work has seen the incidence of attacks continue to rise.<\/p><\/div><p><img decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/EP_RDP_geography_ESET_telemetry.png\" alt=\"\" width=\"734\" height=\"368\" \/><\/p><div id=\"content-c11219875\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>ESET telemetry also highlights the diversity of popular vulnerable external network intrusion vectors. While password guessing is highly represented statistically, it is followed by Log4j, Struts, and various other vulnerabilities, targeting RDP or VPN apps.<\/p><p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/EP_External_network_ESET_telemetry.png\" alt=\"\" width=\"701\" height=\"357\" \/><\/p><div><div class=\"meta\"><span class=\"author\">M\u00e1rk Szab\u00f3<\/span><time class=\"date hidden-to-sm\">17 Dec 2024<\/time><\/div><div id=\"content-c11219872\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11219874\" class=\"frame frame-default frame-type-image frame-layout-0\"><div class=\"ce-image ce-center ce-above\"><div class=\"ce-gallery\" data-ce-columns=\"1\" data-ce-images=\"1\"><div class=\"ce-outer\"><div class=\"ce-inner\"><div class=\"ce-row\"><div class=\"ce-column\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"content-c11219877\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>Most of the represented intrusion vectors concern key business apps that are used globally. Additionally, a majority of the represented Common Vulnerabilities and Exposures (CVEs) have patches. Despite this, they are still being actively exploited \u2013 meaning that <em>businesses are not patching their tools<\/em>, creating major opportunities for threat actors.<\/p><\/div><div id=\"content-c11219878\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">How to ensure extended protection<\/h3><\/header><p>To ward off threat actors abusing a diversity of vectors, let\u2019s tackle extended network needs step by step:<\/p><\/div><div id=\"content-c11219879\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Advanced threat defense<\/h4><\/header><p>To give additional protection against new and unknown threats, advanced defense is a good idea. In this case, it is done by adding a cloud filter on top of endpoint security, creating a sandboxed environment, such as with <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/advanced-threat-defense\/\" target=\"_blank\" rel=\"noopener\">ESET LiveGuard Advanced<\/a>, that can perform in-depth behavioral analyses to prevent targeted attacks, such as ransomware or attacks via the supply chain. This effectively places defenses outside a corporate network, preventing threats from executing inside.<\/p><\/div><div id=\"content-c11219880\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Cloud and mail<\/h4><\/header><p>Think of the sort of collaborative cloud and mail apps you use (Teams, OneDrive, Gmail, SharePoint), and consider how they enhance a network and connect it to points outside the premises of your organization \u2013 leading to extended collaboration opportunities.<\/p><p>As <a href=\"https:\/\/www.eset.com\/blog\/business\/when-an-employees-social-mindset-becomes-a-threat-to-business\/\" target=\"_blank\" rel=\"noopener\">explained<\/a> by ESET Security Writer Roman Cuprik, large cloud platforms have seen rapid growth, accounting for as much as 280 million users \u2013 inviting malicious actors to abuse them for gain. For example, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gifshell-attack-creates-reverse-shell-using-microsoft-teams-gifs\/\" target=\"_blank\" rel=\"noopener\">GIFShell<\/a> enabled threat actors to misuse MS Teams for phishing, executing commands to steal data using GIFs.<\/p><p>Therefore, protecting the cloud and mail through solutions such as <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener\">ESET Cloud Office Security<\/a> and <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/mail-security\/\" target=\"_blank\" rel=\"noopener\">ESET Mail Security<\/a> is an easy way to prevent abuse, as they actively scans all files at all points of their life in the cloud \u2013 stopping spam, malware, phishing, and other threats early.<\/p><\/div><div id=\"content-c11219881\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Authentication<\/h4><\/header><p>It was previously mentioned that password-guessing attacks are quite common. Passwords themselves are often not enough to ensure account security, either because they have been leaked as part of a security breach or because of their simplicity, becoming easily brute-forced.<\/p><p>Thus, <a href=\"https:\/\/www.eset.com\/blog\/business\/secure-authentication-put-your-cybersecurity-helmet-on\/\" target=\"_blank\" rel=\"noopener\">secure authentication<\/a> adds a layer on top, preventing password misuse from letting attackers gain access to user accounts. This is very useful also in the case of RDP and VPN security, as those are also easily compromised through credential misuse. With authentication, though, security is ensured by the provision of one-time-use, time-limited codes or tokens, as attackers would need access to this factor to verify their access attempt.<\/p><\/div><div id=\"content-c11219882\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Encryption<\/h4><\/header><p>A basic compliance and cyber-insurance ask is encryption. Most often associated with data at rest (storage), encryption prevents physical exploitation of endpoint devices in case a computer, for example, is stolen. Encryption also minimizes risk stemming from data breaches, as specific solutions such as <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/encryption\/#content-endpoint-encryption\" target=\"_blank\" rel=\"noopener\">ESET Full Disk Encryption<\/a> make sure that data are protected at all times.<\/p><\/div><div id=\"content-c11219883\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h4 class=\"bold\">Vulnerability and patch management (V&amp;PM)<\/h4><\/header><p>Known vulnerabilities (CVEs) present a major exploitable attack vector, open to abuse by malicious actors. CVEs can be present both in apps and OSs, which is why security updates exist to tackle any vulnerability gaps.<\/p><p>However, some businesses forget or don\u2019t do this, leading to data breaches due to negligence. This can be followed by denied insurance claims and compliance-induced fines for not dealing with known security gaps. To prevent such cases comprehensively, think about obtaining a <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/vulnerability-patch-management\/\" target=\"_blank\" rel=\"noopener\">V&amp;PM solution with automatic updates<\/a> that satisfies this need in the background.<\/p><\/div><div id=\"content-c11219884\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">(Ex)tending your security<\/h3><\/header><p>Extended security doesn\u2019t mean extending security resources. Most of the previous solutions don\u2019t require manual adjustments apart from initial setup, as the greatest thing about automation these days is its quiet but significant impact.<\/p><p>Think of it as a cardboard box \u2013 while the foil and soft particles (multilayered security) inside protect the integrity of your purchased product (endpoint), extended protection plugs any voids (vulnerabilities), tapes over the edges (encryption) and puts a cargo truck between the box and the outside world (advanced threat defense) to protect it from direct damage. As for authentication, every delivery must be signed for. \ud83d\ude42<\/p><p><em>For more information on how multilayered endpoint security serves as a powerful core of business protection, read our blog posts on <a href=\"https:\/\/www.eset.com\/blog\/business\/what-is-fileless-malware-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">Fileless malware<\/a> and <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/preparing-for-uefi-bootkits-eset-discovery-shows-the-importance-of-cyber-intelligence\/\" target=\"_blank\" rel=\"noopener\">UEFI bootkits<\/a>.<\/em><\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Essential security can take care of most threats \u2013 but  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-100493","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Delivering business security with extended prevention - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Delivering business security with extended prevention - Version 2\" \/>\n<meta property=\"og:description\" content=\"Essential security can take care of most threats \u2013 but [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-28T08:59:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/delivering-business-security-with-extended-prevention\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Delivering business security with extended prevention\",\"datePublished\":\"2024-12-28T08:59:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/delivering-business-security-with-extended-prevention\\\/\"},\"wordCount\":1194,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/extended_prevention_small.jpg\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/delivering-business-security-with-extended-prevention\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/\",\"name\":\"Delivering business security with extended prevention - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/extended_prevention_small.jpg\",\"datePublished\":\"2024-12-28T08:59:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/extended_prevention_small.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/extended_prevention_small.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/delivering-business-security-with-extended-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Delivering business security with extended prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Delivering business security with extended prevention - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Delivering business security with extended prevention - Version 2","og_description":"Essential security can take care of most threats \u2013 but [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/","og_site_name":"Version 2","article_published_time":"2024-12-28T08:59:20+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/delivering-business-security-with-extended-prevention\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Delivering business security with extended prevention","datePublished":"2024-12-28T08:59:20+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/delivering-business-security-with-extended-prevention\/"},"wordCount":1194,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/delivering-business-security-with-extended-prevention\/","url":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/","name":"Delivering business security with extended prevention - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg","datePublished":"2024-12-28T08:59:20+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/extended_prevention_small.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/delivering-business-security-with-extended-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Delivering business security with extended prevention"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-q8R","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=100493"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100493\/revisions"}],"predecessor-version":[{"id":100500,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100493\/revisions\/100500"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=100493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=100493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=100493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}