Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Website Security Solutions
Showing posts in English
Brian Wall | 29 Apr 2013 | 0 comments

SSL VPNs – DELIVERING VIP VALUE

With heavier demands for access to corporate and personal information – especially when ‘on-the-go’, via a proliferation of mobile devices  – staying safe has never been more challenging or crucial.

Coping with this is something that organisations have to manage in their working environments. As new technology evolves, the challenge is to stay ahead of the game

Virtual Private Networks (VPNs) have become a common and easy way to secure communications over the internet. VPN services are a fundamental part of distributed systems, enabling the creation of secure data tunnels to remote sites or hosts. VPNs use cryptography to scramble data, so that it's unreadable during its journey across the internet, protecting data security and integrity. Deploying VPNs allows businesses to deliver secure, encrypted connectivity for a workforce on the move, which needs access to critical corporate network...

Belinda Charleson | 29 Apr 2013 | 2 comments

eCommerce is growing worldwide, and according to recent estimates from eMarketer online sales hit USD1 trillion in 2012 – which represented a year on year growth of over 21%. And what does this mean for Australia? The numbers for AU are equally as encouraging with ecommerce sales growing to $37.1 billion in 2013 (up from $33 billion in 2012)*.

To support this growth and explore the drivers and opportunities for the region, a new conference and expo was run in Melbourne last week: The Symantec Web Security Solutions Team attended the inaugural eCommerce Conference and Expo in Melbourne, Victoria. The event consisted of a packed conference track and a large expo show floor, and was well attended from a wide ranging group of people from enterprise and technology solution providers to SMB and start-up businesses. What...

Brad | 26 Apr 2013 | 0 comments

In my last blog, I talked about how the 2012 Internet Security Threat Report points out the vulnerabilities common for small- and medium-sized businesses, and because of their mistakes for the larger enterprises that do business with them. So let’s talk about some good practices to address these risks.

First and most important is education. Employees need to understand what the company rules are on how to be secure, and understand each of their individual roles in the process. In turn, the roles and responsibilities need to support good security policies including separation of duties, access controls, and the idea of 'least privilege'. For anyone new to the concept, least privilege is illustrated most simply that a temporary secretary shouldn’t have access to the same databases at the...

rhoblit | 22 Apr 2013 | 0 comments

The Online Certificate Status Protocol (OCSP) is the protocol used by browsers to obtain the revocation status of a digital certificate attached to a website. Naturally OCSP speed is considered one of the main criteria for quality, as browsers reach out to webservers and confirm that the SSL certificate is valid.

It is the first criteria, but certainly not the only one. Most of the major Certificate Authorities (CAs) measure similarly in OCSP speeds according to reputable third party tests, some trending slightly lower or higher. Mindful investments in infrastructure and architecture keep the speed battle going, and competition is fierce. But there are four aspects to OCSP and the whole SSL certificate verification structure that should be considered, and held equal in importance.

A second factor is reliability. When a Certificate Authority is tricked into issuing a legitimate SSL certificate for third party fraudulent activities, the entire industry can suffer a loss...

Brad | 19 Apr 2013 | 0 comments

The landscape

This year’s Internet Security Threat Report is very sober reading for SMBs. Last year, targeted attacks on small companies (fewer than 2,500 employees) went up 50%. Yes, it's true: Criminals realized that money stolen from the SMB would spend just as nicely as money pulled from a large corporation, and was much easier to acquire. Smaller companies have income in the bank, employee and customer data, and sometimes very valuable intellectual property that they're hoping to make a lot of money with. Yet with all these assets, surveys last year showed that the majority of smaller business owners think they're too small to be targeted by evildoers.

A secondary problem for the SMB situation is the larger enterprise they want to do business with. With inadequate security, the vulnerabilities for an SMB can be points of entry into larger...

Leelin Thye | 16 Apr 2013 | 1 comment

Secure Hash Algorithm 256 (SHA-2 or SHA-256) support on Symantec Code Signing for Individuals and Symantec Code Signing for Organizations is available starting April 1st, 2013 on the following Symantec Code Signing platforms: Microsoft® Authenticode™, Java™, Adobe® Air® and Microsoft® Office Visual Basic® for Applications (VBA). You will be able to select the option for SHA-2 through the ordering pages, reissue process and via the Application Programmatic Interface (API) for QuickOrder, QuickInvite and Reissue.

SHA-2 was published by National Institute of Standards and Technology (NIST) as U.S. Federal Information Processing Standard.

Please note that some older applications and operating systems do not support SHA-2, for example, Windows™ XP Service Pack 2 or lower does not support the use of SHA-2. Java SDK 1.4.2 or higher...

Jimmy Edge | 08 Apr 2013 | 0 comments

14717-Symantec-WSTR-header-660x200_0.jpg

More and more business is being conducted on the internet these days, with even the smallest of businesses likely to have some kind of web presence.

The web is a great arena for businesses, especially smaller outfits, to operate in. The costs are low and it’s relatively easy to build up a strong online presence.

But conducting business online does have its dangers, especially given the number of threats posed by cyber criminals these days.

This is most important when it comes to transferring sensitive data across the web. Whether it’s sending contracts or receipts via email, or transferring sensitive financial information, protecting data that is being sent via the web is vital. So, what can you do to protect it?

...

rhoblit | 05 Apr 2013 | 0 comments

Speed. Availability. Security. Name recognition. These are things everyone cares about, in any online industry. Whether you're selling shoes, running a charity, or operating a multi-national company with global online presence, it matters that your customers feel safe to interact online with you, and that they have a fast, efficient experience at your site to bring them back again.

Speed and availability are becoming two of the biggest challenges for hosting companies and SSL providers alike. Speed of OCSP lookup is important, to keep within acceptable guidelines of page load times. Symantec is constantly looking for ways to improve, and we invest in expanding our infrastructure to enhance speed and reliability. GlobalSign has advertised that they outsourced their OCSP lookup to CloudFlare. Now, there's nothing wrong with a company outsourcing services, if it helps operate more safely and efficiently.

Alas CloudFlare has had some significant recent outages, so...

Jimmy Edge | 27 Mar 2013 | 2 comments

The world of social media has taken off at a breath-taking pace. Yes, it‘s gone ‘viral’ – and yet the current rate of usage may just be the beginning. With millions of people having fought tooth and nail to get their hands on the latest smart phones – just look around at how many are proudly brandishing them in your workplace – the sheer scale of this phenomenon has started to reveal itself.

Everywhere you go, the evidence is increasingly in front of you: people in cafes on their laptops; on trains, using their smartphones; at home, on their PCs/laptops/smartphones; and at work, using everything and anything, both standalone AND connected to the Internet! The upshot is that security is now being compromised as never before.

...

Jimmy Edge | 21 Mar 2013 | 0 comments

Consumerisation of information technology is forcing IT to take a new look at security. And, if you run a small to mid-sized company, with limited resources, it’s adding pressure.. With social media and BYOD (Bring Your Own Device) changing  the whole working landscape, how do you protect yourself against the ever growing number of security threats – data breaches through the network, data leakage by employees, malware attacks and lost hardware?

Not long ago, no doubt, everything would have seemed that much clear cut to you, with the boundaries between people’s personal and work lives quite distinct. Now, that has all been turned on its head. Those boundaries have been torn down – with the estimated 22.5% of the time that we now spend online (according to social media watchdog Nielsen in ‘State of the Media: The Social Media Report’), putting enormous pressure on security.

You’ve probably all heard the hype that surrounds...