-
ENISA Cybersecurity guide for SMEs_EL
-
Located in
Publications
/
Report files
/
SMEs Leaflet - Translations
-
Survey to Explore the Preparedness of EU SMEs for Cybersecurity Challenges
-
Survey on cybersecurity challenges for SMEs: A review on how businesses in the EU are preparing for and coping with cyber threats.
Located in
News
/
ENISA News
-
European SMEs facing increased cyber threats in changing digital landscape
-
In the lead up to the EU Agency for Cybersecurity’s forthcoming Cybersecurity for SMEs report, the Agency gathered European businesses, agencies and ...
Located in
News
/
ENISA News
-
Phishing most common Cyber Incident faced by SMEs
-
The European Union Agency for Cybersecurity identifies the cybersecurity challenges SMEs face today and issues recommendations.
Located in
News
/
ENISA News
-
Responsibility
-
Cybersecurity is clearly a key element in the ongoing success of any SME, in particular during the COVID19 Pandemic. It is only appropriate that responsibility ...
Located in
SecureSME
/
Cyber Tips
/
Protect Employees
-
Employee Buy-in
-
It is essential that employees understand the importance that good cybersecurity is in protecting the organization, protecting the personal data entrusted by ...
Located in
SecureSME
/
Cyber Tips
/
Protect Employees
-
Cybersecurity Policies
-
SMEs should set up clear and specific rules outlined in cybersecurity policies for its employees on how they are expected to behave when using the company’s ...
Located in
SecureSME
/
Cyber Tips
/
Protect Employees
-
Passwords
-
One of the key layers of protection against unauthorized access to a company’s data is the implementation of a suitable access control procedure.
Located in
SecureSME
/
Cyber Tips
/
Enhance processes
-
Software Patches
-
Software updates fix known security vulnerabilities, and may also improve the functionality and performance of your program or device.
Located in
SecureSME
/
Cyber Tips
/
Enhance processes
-
Secure Backups
-
To enable the recovery of the information, backups should be kept, as they are an effective way to recover for example from ransomware.
Located in
SecureSME
/
Cyber Tips
/
Strengthen technical measures