Skip to content

ESET bulks up its ESET HOME consumer protections against identity theft, ransomware, phishing, and more

BRATISLAVA — October 22, 2024 —ESET, a global leader in cybersecurity solutions, today announced the launch of its upgraded consumer offering ESET HOME Security, introducing new features such as ESET Folder Guard and Multithread Scanning, together with an overall improvement of its capabilities. Identity Protection* featuring Dark Web Monitoring is now globally available.

These enhancements to ESET HOME Security, as an all-in-one solution for consumers, correspond to the increasing number of advanced, automated, and AI-driven threats targeting individuals and address growing concerns about data privacy, ransomware attacks, phishing, and scams.

Despite being packed with the latest technology, ESET HOME Security remains easy to use thanks to ESET HOME, a comprehensive security management platform available across all major operating systems — Windows, macOS, Android, iOS — and covering all typical smart home devices. Now ESET HOME Security offers even more formidable protection for entire households.

“As a progressive digital life protection vendor, ESET is dedicated to always being one step ahead of adversaries. Our team of experts created a powerful digital life protection solution that blends more than 30 years of human expertise with artificial intelligence, multilayered security technology, and live cloud protection. Following a prevention-first approach that stops threats before they can do any harm, ESET HOME Security brings peace of mind regarding privacy and security, while staying user-friendly, powerful, light, and fast,” said Viktória Ivanová, Vice President of Consumer and IoT Segment at ESET.

To complement the long list of already existing layers of protection, including Antivirus & Antispyware, Firewall, Ransomware Shield, Anti-Phishing, Safe Banking, Safe Browsing, Password Manager, VPN,  and Anti-Theft — to name just a few — new features and upgrades have been added:

New Dark Web Monitoring — ESET Identity Protection* scours websites on the dark web, black market chat rooms, blogs, and other data sources to detect the illegal trading and selling of users’ personal information. ESET technology sends prompt alerts so users can take immediate action.

New ESET Folder Guard — This technology helps protect Windows users’ valuable data from malicious apps and threats, such as ransomware, worms, and wipers (malware that can damage users’ data). Users can create a list of protected folders — files in these folders can’t be modified or deleted by untrusted applications.

New Multithread Scanning — Improves scanning performance for multi-core processor devices using Windows by distributing scanning requests among available CPU cores. There can be as many scanning threads as the machine has processor cores.

New Link Scanner — This feature improves ESET Mobile SecurityAnti-Phishing that, in general, blocks potential phishing attacks coming from websites or domains listed in the ESET malware database. The Link Scanner is an additional layer of protection for Android smartphone users that allows ESET Mobile Security to check every link a user tries to open, not only those coming from supported websites and social network apps. For instance, if a user receives a phishing link in a game app and opens it, the link is first redirected to the ESET Mobile Security app, where it is checked, before being redirected to the browser. If the user is using an unsupported browser, the Link Scanner will block the malicious link in this case.

Improved Gamer Mode — This feature is for users who demand uninterrupted usage of their software without pop-up windows and want to minimize CPU usage. The improved version allows users to create a list of apps automatically starting gamer mode. For cautious players, there is also a new option to display interactive alerts while gamer mode is running.

Improved Password Manager — ESET Password Manager now includes an option to remotely log out of Password Manager when it is logged in on other devices. Users can check their password against the password breach list and view a security report that informs users if they use any weak or duplicate passwords for their stored accounts. Password Manager has an integrated option to use third-party programs as an optional two-factor authentication (2FA).

Improved Cyber Security for Mac users —ESET HOME Security tiers for Mac users now have a new unified Firewall with both basic and advanced setup options in the main Graphical User Interface (GUI). This means the solution is tailored to the needs of users from basic to more advanced, without unnecessary settings.

This robust all-in-one security product is an ideal solution for all who have concerns beyond general cybersecurity, and it includes privacy protection, identity protection, performance optimization, device protection, and smart home protection. Because in a world of advanced cyberthreats, quality matters.

More information about the consumer offering and subscription tiers can be found here.

*ESET Identity Protection is available only in selected countries.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The NSA’s Six Principles for OT Cybersecurity: A Comprehensive Overview

When it comes to operational technology (OT), cybersecurity often feels like walking a tightrope—balancing the need for robust defense mechanisms with the complexities of legacy systems and industrial controls. The stakes? Everything from critical infrastructure like power grids and water treatment facilities to manufacturing plants. A cyber incident in these environments could have real-world consequences that go far beyond the digital realm. Recognizing the increasing vulnerability of OT systems, the National Security Agency (NSA), alongside the Australian Signals Directorate (ASD) and other partners, has laid out six key principles designed to fortify OT environments against cyber threats.

These principles offer a structured, yet flexible, approach to addressing cybersecurity concerns in OT environments. Let’s break down these guiding principles and their relevance to keeping critical infrastructure secure.

1. Know and Control Your OT Environment

The first step to protecting your OT environment is understanding it intimately. This principle calls for organizations to identify all the devices, systems, and networks in their OT environment. Many OT systems were not designed with cybersecurity in mind, making them susceptible to vulnerabilities that bad actors can exploit.

By establishing a comprehensive inventory of these systems, including their communication paths and dependencies, organizations can gain visibility into what needs protection and prioritize vulnerabilities. This principle also underscores the importance of segmenting OT systems from IT networks, ensuring that risks from the IT side don’t spill over into operational systems.

2. Implement Secure Configuration Practices

If your OT system configurations are insecure or out of date, it’s like leaving the front door of your house unlocked with the key under the mat. Secure configuration practices ensure that OT devices are set up to minimize exposure to attacks. This principle emphasizes the importance of hardening systems by removing default credentials, closing unnecessary ports, and disabling unused features or services.

Configurations should also be tested and validated regularly. Given that many OT systems can’t be easily updated due to uptime requirements, strong initial configuration and consistent monitoring can close potential security gaps without disrupting operations.

3. Reduce Your OT Attack Surface

The less exposed your OT systems are, the harder it is for malicious actors to find a foothold. This principle focuses on minimizing the attack surface by limiting network connectivity, disabling unnecessary features, and restricting direct access to critical OT systems.

It’s not just about reducing internet-facing components but also about using advanced measures like air-gapping, network segmentation, and zero-trust architectures to limit access to OT networks. This way, even if a breach occurs on the IT side, it won’t necessarily extend into the OT environment, preventing lateral movement.

4. Build a Resilient Architecture

Resilience means more than just defense; it’s about ensuring that OT systems can continue functioning during and after a cyber attack. Building resilience into OT architecture involves creating redundancies, maintaining robust backup systems, and ensuring that critical OT operations can survive even when under attack.

This principle encourages organizations to implement defense-in-depth strategies that layer security mechanisms throughout the system to provide multiple barriers against an attacker. With this, OT environments can remain functional, or at least recover quickly, if an attack does occur.

5. Prepare for and Manage Incidents

This principle stresses the importance of a proactive approach to incident response in OT environments. Given the high stakes of an OT attack, rapid response and recovery capabilities are essential. Organizations must have well-rehearsed incident response plans specifically tailored for OT systems, including roles and responsibilities, communication protocols, and system restoration processes.

Simulation exercises, threat hunting, and frequent drills are necessary to ensure teams are ready to act swiftly in case of a security incident. Preparation can make the difference between a controlled disruption and a cascading system failure.

6. Strengthen Your OT Supply Chain Security

Supply chain attacks are becoming more prevalent, and the OT world is no exception. Since OT environments rely heavily on third-party hardware, software, and services, this principle focuses on securing the entire supply chain. Organizations must vet suppliers thoroughly, ensuring that they meet cybersecurity standards and don’t introduce vulnerabilities into the OT environment.

Cybersecurity due diligence should be extended to all suppliers, from those providing physical devices to software vendors. Implementing security requirements in contracts and continuously monitoring the supply chain for risks can help organizations ensure that the trust they place in their partners doesn’t become a weakness.

The Importance of a Holistic Approach

What makes these six principles from the NSA stand out is their holistic nature. Rather than focusing solely on reactive measures or specific technology solutions, they promote a comprehensive, proactive approach to securing OT environments. In an era where cyber threats are becoming increasingly sophisticated and state-sponsored actors are targeting critical infrastructure, adhering to these principles can significantly reduce risk.

By understanding and controlling OT environments, implementing secure configurations, reducing the attack surface, building resilient architectures, preparing for incidents, and securing the supply chain, organizations can better safeguard their OT systems—and by extension, the critical services they deliver to society.

Conclusion

The NSA’s six principles for OT cybersecurity reflect a clear understanding of the modern threat landscape and the unique challenges that OT environments face. They offer a blueprint for organizations looking to protect their critical infrastructure in a way that is sustainable, scalable, and, most importantly, secure. As the lines between IT and OT continue to blur, adhering to these principles will help organizations strike that necessary balance between functionality and security in an increasingly connected world.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×