Video Screencast Help

cybercriminals

Results for cybercriminals

Check out Part 1 of Symantec's "Underground Economy" blog series. The number of data breaches ...
Blog Entry by Linda Smith Munyan | 23 Jul 2014 | 1 comment
Today’s business users are nothing if not productive, but too often they don’t think about if they are working with confidential data or if they are protecting it appropriately. The fact is, employees regularly save patient records to thumb drives, ...
Blog Entry by linda_park | 08 May 2013 | 0 comments
The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world. This year’s report shows more targeted attacks, ...
Blog Entry by Symantec Securi... | 16 Apr 2013 | 0 comments
I read with great interest The New York Times’ “Room for Debate” that discussed whether companies should disclose when they get hacked. When brands big and small suffer a data breach and lose customer data, they are required to disclose the breach ...
Blog Entry by RobertHamilton | 03 Apr 2013 | 0 comments
I came across this article not too long ago and it really got me thinking about not only the places where I put my information on the Internet, but the reasons I put my information out there.  Most sites we put our information seem really innocuous ...
Blog Entry by phlphrrs | 07 Mar 2013 | 0 comments
I frequently present on security threats and the Symantec Internet Security Threat Report.  There are many great statistics from the current report, 403M unique variants of malware, 5.5B web attacks blocked, 4,597 web attacks per day, etc.   I ...
Blog Entry by Joseph.Rogalski | 30 Oct 2012 | 0 comments
Over a century ago, individuals had to protect themselves with a gun, whether at home or walking in the streets.  We thought we were getting civilized when our law enforcement agencies became able to handle this level of criminality to protect the ...
Blog Entry by phlphrrs | 09 Aug 2012 | 0 comments
When news broke that passwords may have been compromised at some very popular web sites, I immediately thought “Where else am I using that same password?” I, like many others, sometimes reuse passwords even though I know better.  The last 48 hours of ...
Blog Entry by phlphrrs | 08 Jun 2012 | 0 comments
What makes the healthcare industry such a hot target for hackers? The answer lies in the records that they keep. Medical records contain some of the most valuable personal information — social security numbers, birth and death dates, family information, ...
Blog Entry by David Finn | 05 Jun 2012 | 1 comment
Can data breaches be stopped, really? This was the question posed by Larry Ponemon, chairman and founder of the Ponemon Institute, at the start of a panel discussion I attended at the RSA Conference last month. Experts on this panel seemed to agree on ...
Blog Entry by RobertHamilton | 29 Mar 2012 | 0 comments