Skip to content

ESET’s Chief Security Evangelist Tony Anscombe to Speak at NetDiligence Cyber Risk Summit

ESET, a global leader in digital security, today announced that its Chief Security Evangelist, Tony Anscombe, will serve as a distinguished panelist at the annual NetDiligence Cyber Risk Summit. The event, held at the Eden Roc Hotel, brings together the world’s foremost leaders in cyber insurance, law, and technology.

Strategic Insight into AI Governance

Anscombe will join industry experts on February 9 for the session “Assessing AI Risk Management Frameworks”. The panel will investigate how organizations can scale AI through model integrity and explore the cybersecurity responses currently shaping global AI policy. Alongside moderators and peers from LevelBlue, TrendAI, and Deloitte, the session will focus on the architectures required to support safe enterprise automation.

“AI risk management is about understanding acceptable thresholds and making documented, informed decisions,” said Anscombe. “Organizations require clear policies and human oversight to ensure that AI is deployed responsibly without creating unintended harm or exposing sensitive data.”

Bridging the Cyber Insurance Gap

Through strategic collaborations with partners such as Amwins and Patriot Growth Insurance Services, ESET is actively closing the gap between security posture and insurance eligibility. By combining advanced Managed Detection and Response (MDR) with comprehensive risk assessments, ESET empowers businesses to better qualify for critical cyber coverage.

For more information on ESET’s work partnering with cyber insurance vendors, and how to become qualified, visit here.

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Simplify Your Patch Management with Action1

Simplify Your Patch Management with Action1

Action1 pioneers autonomous endpoint management with an infinitely scalable, highly secure, cloud-native platform configurable in 5 minutes — and it just works, with no VPN needed.

First 200 endpoints are free forever: test as long as you want in your enterprise or use perpetually in your small business.

Enterprise Patch Management Trusted by Companies

Enable IT security and operations teams to detect, prioritize, and remediate vulnerabilities to ensure continuous compliance – all while reducing costs and making your enterprise secure.

Unified OS and Third-Party Patching

Automate the entire patching process for remote and onsite endpoints, from identifying and deploying missing updates to compliance reporting.

Vulnerability Discovery and Remediation

Prevent security breaches and ransomware attacks. Detect vulnerabilities in OS and applications in real-time, and enforce remediation.

Secure and Trusted: SOC 2 and ISO 27001

Action1 is the first vendor focusing on patch management certified for SOC 2 Type II, ISO/IEC 27001:2022, and TX-RAMP.

Get Started Free for up to 200 Enpoints

Schedule a meeting to get onboard today!

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Understanding Encryption: The Shield of the Digital Age

Encryption sits at the core of nearly every digital system we use today. It is the sophisticated mechanism that transforms readable information into protected data, ensuring privacy, security, and compliance across the globe.

The Golden Rule: Encryption protects Data at Rest (files on your hard drive) and Data in Transit (messages moving across the internet).

 

How Encryption Works

Think of encryption as a high-tech vault. To protect your data, it goes through a four-step journey:

  • Plaintext: Your original, readable information.
  • The Algorithm: The mathematical formula used to scramble the data.
  • The Key: A random string of bits that locks and unlocks the data.
  • Ciphertext: The resulting “scrambled” data that is unreadable without the key.

 

Types of Modern Encryption

 

Symmetric Encryption

Uses a single secret key to both encrypt and decrypt. It is highly efficient and fast, making it the standard for full-disk encryption and database security.

Examples: AES, XChaCha20

 

Asymmetric Encryption

Uses a pair of keys: a Public Key for encryption and a Private Key for decryption. Essential for secure key exchanges over the internet.

Examples: RSA, ECC

 

Why Encryption Matters

Encryption is more than just a security feature; it is a baseline requirement for modern life:

  • Privacy: Prevents ISPs and hackers from “eavesdropping” on your traffic.
  • Security: Reduces the impact of data breaches; stolen data is useless if it is encrypted.
  • Integrity: Ensures that data hasn’t been altered while moving from sender to receiver.
  • Compliance: Mandated by regulations like GDPR and HIPAA to protect sensitive user data.

 

Experience Total Privacy with NordPass

At NordPass, we use the cutting-edge XChaCha20 algorithm to protect your digital vault. This symmetric stream cipher is designed for maximum speed and robust security, ensuring that your passwords, credit card details, and secure notes are always under a 256-bit lock and key.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The combolist economy: How stolen credentials fuel cybercrime

ESET Cyber Security Pro is merging — key details inside

Hello,

We have important news: ESET Cyber Security Pro is merging with ESET Cyber Security for even better protection.

ESET Cyber Security Pro will stop working after June 30, 2026. Customers can update to ESET Cyber Security at no extra cost, and no action is required from you—ESET will notify them directly.

If customers come to you for an update:

Please note: Standalone purchases of ESET Cyber Security and ESET Cyber Security Pro were discontinued in November 2024. However, ESET HOME Security Essential, Premium, and Ultimate continue to offer robust macOS protection—ESET Cyber Security is available under any of these tiers!

What do customers gain with the new and improved ESET Cyber Security?

  • Enhanced macOS compatibility

  • An improved Firewall

  • Upgraded Anti-Malware and Anti-Phishing

  • Hassle-free, automatic updates—and more!

While Parental Control will no longer be available, ESET Cyber Security continues to provide family-friendly protection.

 

Need assistance? We’re happy to help.


Stay safe,
Version 2 Singapore

Stay safe,
Version 2 Singapore

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Your protection continues—update to ESET Cyber Security

Hello,

 

We have important news: ESET Cyber Security Pro is merging with ESET Cyber Security to give you even better protection.

 

ESET Cyber Security Pro will stop working after November 18, 2025—but updating is free and easy!

What do customers gain with the new and improved ESET Cyber Security?

  • Enhanced macOS compatibility 

  • An improved Firewall

  • Upgraded Anti-Malware and Anti-Phishing 

  • Hassle-free, automatic updates—and more!

While Parental Control will no longer be available in the new version, ESET Cyber Security offers reliable protection for the whole family.

How to update:

 

Stay safe,
Version 2 Singapore

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

2FA Recovery Guide: What to Do If You Lose Your Phone

Using your phone as a Two-Factor Authentication (2FA) device is incredibly convenient—until that phone goes missing. If you find yourself locked out of your accounts because your verification device is lost or stolen, follow these steps to regain control.

Important: If you think your phone was stolen, use “Find My Device” (Android) or “Find My” (iOS) immediately to lock or erase the device remotely. This prevents attackers from accessing your 2FA apps.
 

Immediate Recovery Methods

1. Use Your Backup Recovery Codes

Most major platforms (Google, Microsoft, Facebook) provide a list of one-time recovery codes when you first enable 2FA. If you followed security best practices and stored these in a safe place (like a physical safe or a secure note in a password manager), you can enter one of these codes instead of the mobile verification.

2. SMS Redirection via SIM Swap

If you use SMS-based 2FA, your security is tied to your phone number. Contact your mobile service provider to report the lost phone and request a new SIM card for your existing number. Once the new SIM is activated in a backup device, you will begin receiving 2FA codes again.

Setting Up Your New Device

Once you have a new phone, follow these steps to restore your Google Authenticator or similar apps:

  • Sign in via Backup: Use a backup email or trusted secondary phone number to access your main account.
  • Re-activate Authenticator: Go to your account security settings and select “Set up Authenticator” to generate a new QR code.
  • Sync to Password Manager: Consider using a manager like NordPass to store 2FA seeds or recovery codes so they are accessible from any browser.

 

Future-Proofing: Transition to Passkeys

The safest way to avoid the “lost phone” trap is to adopt Passkeys. Unlike traditional 2FA, Passkeys use cryptographic keys stored securely in the cloud or an encrypted vault. If you lose your phone, your Passkeys remain accessible via your account login on other devices, providing robust security without the single-point-of-failure risk of a physical phone.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Managing Shadow IT Risks

Shadow IT is the use of devices, software, or cloud services without the approval or knowledge of the IT department. While usually driven by a desire for efficiency, it creates significant security blind spots.

Key Takeaways:

  • Enterprises typically use 10x more unsanctioned apps than approved ones.
  • Hybrid work and personal devices (BYOD) have accelerated Shadow IT adoption.
  • Risks include data breaches, compliance violations, and malware exposure.

Why Shadow IT is a Growing Concern

In most cases, employees use Shadow IT not out of malice, but to overcome friction. Common drivers include:

  • SaaS Accessibility: Most cloud tools only require a personal email to sign up.
  • Approval Delays: Official IT cycles can be slower than the pace of a specific project.
  • Feature Gaps: Official tools may lack usability or real-time collaboration features.

Critical Risks to the Organization

Data Breaches & Leakage
Regulatory Non-compliance
Malware & Credential Theft
Operational Disruptions

Detection and Prevention Best Practices

How to Detect Unsanctioned Tools

IT teams can regain visibility through Network Traffic Analysis, Endpoint Monitoring, and auditing Expense Reports to find unauthorized software subscriptions.

Best Practices for Management

  • Establish Clear Policies: Create a simple, fast-track process for tool approvals.
  • Use CASBs: Cloud Access Security Brokers provide visibility into cloud-based data movement.
  • Implement DNS Filtering: Block access to high-risk or unapproved domains at the network level.
  • Employee Education: Train staff to understand that security is a shared responsibility.

Securing the Perimeter with NordLayer

NordLayer helps organizations control Shadow IT through proactive tools like DNS Filtering, which blocks malicious domains, and Application Blocker, which prevents high-risk software from connecting to your network.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit Platform Crowned in Three Categories at Security Today’s CyberSecured Awards 2025

Keepit, a global leader in cloud-native data protection, is proud to announce its recognition at the prestigious 2025 Security Today CyberSecured Awards. For the second consecutive year, Keepit secured top honors in three critical categories:

• Cloud Security
• Data Loss Prevention (DLP)
• Disaster Recovery / Business Continuity

Immutable Backups: The Last Line of Defense

As organizations increasingly rely on SaaS applications and AI, the necessity for robust, immutable backups has never been higher. The Keepit platform helps companies mitigate the risk of data loss resulting from cyberattacks or human error by protecting thirteen key applications, including:

  • Microsoft 365
  • Microsoft Entra ID
  • Okta
  • Google Workspace

“With the increasing use of SaaS applications and AI in critical business operations, immutable backups and rapid recovery are at the center of modern data resilience. This recognition underscores our commitment to security, reliability, and best-in-class data protection.”

— Michele Hayes, CMO at Keepit

This achievement builds on Keepit’s successful year, which included multiple accolades such as being named “Business Continuity Cyber Solution of the Year” and multiple wins at the Global InfoSec Awards.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Research analyzed a critical flaw in Windows Imaging Component, which abuses JPG files

ESET researchers have concluded an in-depth examination of CVE-2025-50165, a Windows Imaging Component vulnerability. Although classified as critical, ESET’s root cause analysis suggests the complexity of exploitation makes large-scale attacks highly improbable.

Technical Distinction: The flaw exists in the encoding and compression stage of a JPG image, not the decoding (rendering) stage. Simply viewing a malicious image will not trigger the vulnerability.

Root Cause: WindowsCodecs.dll

The vulnerability occurs when WindowsCodecs.dll attempts to encode a JPG image using 12-bit or 16-bit data precision. The specific function involved, jpeg_finish_compress, is triggered during specific actions such as saving an image or generating system thumbnails.

Expert Analysis

“Our analysis indicates that exploitation is harder than it appears,” says ESET researcher Romain Dumont. “A host application is only vulnerable if it allows JPG images to be re-encoded, and even then, an attacker would need precise control over heap manipulation and address leaks to achieve remote code execution.”

Key Takeaways

  • Open Source Roots: The component utilizes libjpeg-turbo, which saw similar vulnerabilities patched in late 2024.
  • Reproduction: ESET has successfully reproduced the system crash using a 12-bit/16-bit JPG test method.
  • Status: Microsoft released a patch for this vulnerability in August; users are encouraged to verify their systems are up to date.

For the full technical report, visit WeLiveSecurity.com and search for “Revisiting CVE-2025-50165.”

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.