Resources

 

[tabs style=”1″]

[tab title=”News“]

Ghost in the locks
[column size=”1-5″ last=”0″][/column]
[column size=”3-5″ last=”0″]

Hotel rooms offer us a feeling of relative security. Would you feel as safe if you knew someone could open your door completely unseen, without the original key?

F-Secure has found serious design flaws in a popular smart lock software system. If exploited, it could allow the opening of millions of hotel room doors across the world without the original key.

Click below to find out how our hackers were able to create a master key out of thin air!

[button link=”https://business.f-secure.com/hotel-room-keys-can-be-hacked?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5207&utm_content=10715&elqTrackId=8480b0f740364d8183f570582eefddec&elq=99f36780ae334e1eaefbe13cc27d0870&elqaid=10715&elqat=1&elqCampaignId=5207″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

[/column]
[column size=”1-5″ last=”1″][/column]

Who stole the bits?

[column size=”1-5″ last=”0″][/column]
[column size=”3-5″ last=”0″]

What should companies be prepared for when it comes to modern cyber security? Why does accurately detecting targeted attacks require completely new technologies?

Check out the next episode of Adventures in Cyberland, and find out the answers!

[button link=”https://business.f-secure.com/understanding-broad-context-to-detect-targeted-attacks?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5207&utm_content=10715&elqTrackId=52ed748bea6c4c88b450a9385f28e823&elq=99f36780ae334e1eaefbe13cc27d0870&elqaid=10715&elqat=1&elqCampaignId=5207″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

[/column]
[column size=”1-5″ last=”1″][/column]

F-Secure’s Guide to
GDPR Compliance

Are you and your customers ready for the GDPR?
Read our eBook, and find out what you need to take into
consideration when working towards compliance. You’ll also
hear great GDPR tips from one of F-Secure’s top cyber security consultants!

Click below to find out more!

[button link=”https://business.f-secure.com/ebook-how-to-achieve-long-term-gdpr-compliance?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=7168631238234426b9e167537bc0d928&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

Demystifying Hardware Security

Andrea Barisani steps into the #CyberSauna for a frank and fascinating discussion about securing embedded devices of all kinds. Have a listen, and get five quick takes on the challenges of protecting hardware devices!

[button link=”https://www.f-secure.com/en/web/business_global/our-approach/cyber-security-sauna?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5207&utm_content=10715&_ga=2.14650935.1643928232.1523865181-953997505.1499775405&elqTrackId=8926a95d04e143eb9b6ba6afe515154c&elq=99f36780ae334e1eaefbe13cc27d0870&elqaid=10715&elqat=1&elqCampaignId=5207″ target=”self” color=”#e32d2d” text=”light”]Listen to the podcast >>[/button]

gartner_magic_quadrant_epp
F-SECURE A VISIONARY IN THE
GARTNER MAGIC QUADRANT FOR EPP

Gartner has positioned F-Secure as a Visionary in the 2018 Magic Quadrant for Endpoint Protection
Platforms (EPP)
. Download the report for essential industry insight and details about the vendor evaluations.
You can also share the report results with your customers!
[button link=”https://www.f-secure.com/en/web/business_global/gartner?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=cc5d169973f4432d8022971c28243f89&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Download the report >>[/button]
© F-Secure Corporation

[/tab]

[tab title=”Older News“]

adventures_in_cyberland_ep4
Artificial Intelligence in cyber security
[column size=”1-5″ last=”0″][/column]
[column size=”3-5″ last=”0″]

Artificial intelligence and machine learning are some of the hottest buzzwords in cyber security. But what do they actually mean for your organisation?

Click below, and find out how AI can help you deal with cyber attacks – even those no one has ever seen before!

[button link=”https://business.f-secure.com/artificial-intelligence-and-machine-learning-in-cyber-security?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=b29a8ca5078d48d0a0aba8ddeb629cad&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

[/column]
[column size=”1-5″ last=”1″][/column]

gdpr_guideF-Secure’s Guide to
GDPR Compliance

Are you and your customers ready for the GDPR?
Read our eBook, and find out what you need to take into
consideration when working towards compliance. You’ll also
hear great GDPR tips from one of F-Secure’s top cyber security consultants!

[button link=”https://business.f-secure.com/ebook-how-to-achieve-long-term-gdpr-compliance?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=7168631238234426b9e167537bc0d928&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

f_secure_radarF-Secure Radar is
now better than ever!

We have added several new improvements to F-Secure Radar!
You can now offer your customers faster scans, quicker update
provisioning and streamlined usability.

Click below to find out more!

[button link=”http://app.secure.f-secure.com/e/er?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&s=2484&lid=6080&elqTrackId=9b777c90138c485eb2965c7c41f7a89a&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

cyber_risk_managementCyber Risk Management 101

Cyber threats come in many forms – that’s why their proper
quantification is so difficult. Read our article on cyber risk management,
and find out how you can help your customers analyse their
specific security needs better.

No more guesstimates or ballpark figures!

[button link=”https://business.f-secure.com/cyber-security-risk-management-tips-for-executives?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=3d4164f7adde4abd9c9094164fc38dff&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Learn more >>[/button]

gartner_magic_quadrant_epp
F-SECURE A VISIONARY IN THE
GARTNER MAGIC QUADRANT FOR EPP

Gartner has positioned F-Secure as a Visionary in the 2018 Magic Quadrant for Endpoint Protection
Platforms (EPP)
. Download the report for essential industry insight and details about the vendor evaluations.
You can also share the report results with your customers!
[button link=”https://www.f-secure.com/en/web/business_global/gartner?ecid=8143&utm_source=Eloqua&utm_medium=email&utm_campaign=5181&utm_content=10669&elqTrackId=cc5d169973f4432d8022971c28243f89&elq=0001a10b200b4eb293d6f4f6ae3d070a&elqaid=10669&elqat=1&elqCampaignId=5181″ target=”self” color=”#e32d2d” text=”light”]Download the report >>[/button]
© F-Secure Corporation

 

[/tab]

[tab title=”Infographics“]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]Why spam is on the rise – again![/list][/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]How Does Your Online Security Measure Up?[/list][/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]Why Do Newspapers Spy on You?[/list][/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]How does Encryption Work? (and Why it’s So Important)[/list][/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]An Infographic Look at the Rising Tides of Malware[/list][/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″][list icon=”moon-images” color=”#e32d2d”]Computer Invaders: The 25 Most Infamous PC Viruses of All Time[/list][/column]

[column size=”1-2″ last=”1″]Read more[/column][/tab]

[/tab]

[tab title=”Reports“]

[column size=”1-2″ last=”0″]The realist’s guide to practical endpoint protection[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]How to Avoid an ‘Evil Roommate’ Attack[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]2017. The Year Android and Mac Malware Broke Big?[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]2016 Was Bad — 2017 Looks Worse[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]Another Reason 99% of Mobile Malware Targets Androids[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]Why These Online Criminals Actually Care About Your Convenience[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]F-Secure report details Russian cyber attacks on the U.S., NATO and others[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]The Great Politician Hack[/column]

[column size=”1-2″ last=”1″]Read more[/column]

[column size=”1-2″ last=”0″]The Dangers of Public WiFi – And Crazy Things People Do To Use It[/column]

[column size=”1-2″ last=”1″]Read more[/column]

 

[/tab]

[tab title=”Videos“]

[spoiler title=”Live Security by F-Secure” open=”0″ style=”1″][/spoiler]

[spoiler title=”Let us in. Keep them out.” // F-Secure’s approach to Cyber Security” open=”0″ style=”1″][/spoiler]

[spoiler title=”The Cybercrime Megatrend of 2018 | What the Cyber?” open=”0″ style=”1″][/spoiler]

[spoiler title=”Protect Your Online Privacy and Stay Anonymous with F-Secure FREEDOME VPN” open=”0″ style=”1″][/spoiler]

[spoiler title=”Take Control – F-Secure FREEDOME VPN” open=”0″ style=”1″][/spoiler]

[spoiler title=”Don’t Let Trojan Horses Inside Your Connected Home | F-Secure SENSE” open=”0″ style=”1″][/spoiler]

[spoiler title=”F-Secure Safe Review” open=”0″ style=”1″][/spoiler]

 

[/tab][/tabs]