Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Information Unleashed
Showing posts in English
Steve Cullen | 13 Aug 2012 | 0 comments

In today’s rapidly evolving technology landscape of mobile devices, virtualization, and more data than ever, SMBs need information protection to be easy. Symantec understands the challenges that SMBs face and we are dedicated to removing the complexities of information technology so that they can focus on what they do best.

We are on a mission to create offerings that are fast, simple to deploy and use, are cost-effective, and provide the best customer experience possible. As we work towards that goal, we’re not only providing the best solutions for businesses, but also sharing knowledge that helps them achieve success. Being named as one of the Top 100 Champions in the 2012 Small Business Influencer Awards demonstrates our commitment to small businesses.  

...

John_Brigden | 11 Jul 2012 | 0 comments

The dramatic news that one of the U.K.’s leading financial services organisations had suffered a data outage that led to millions of customers unable to access their accounts should be a wake-up call for every CIO. The event tells them that their operation is entirely dependent on IT and in particular on the IT resources they have to run their systems.

It was once said that financial services can be thought of as a technology business with a financial domain of expertise. Whether or not that is the case, every bank—indeed every business—needs to have in place a watertight disaster recovery that ensures data is continuously available, whatever the scenario. As that major U.K. financial institution is now finding to its cost, the aftermath of a service stoppage can be...

Rich Dandliker | 11 Jul 2012 | 1 comment

In the constant war for information security between businesses and cybercriminals, we are so focused on the faceless, outside enemy that we often fail to recognize potential double agents within our own ranks. With so many resources devoted to preventing hackers and cybercriminals from getting past our external network defenses, it’s easy to neglect internally based intellectual property (IP) theft.

IP theft is staggeringly costly to the global economy: U.S. businesses alone are losing upwards of $250 billion every year. As it turns out, IP thieves are most often either current or former employees.  We trust most of our employees to do the right thing, but the malicious actions of a single person can jeopardize the health of the business and jobs for everyone.  

A research review by Drs. Eric D. Shaw and...

andysinger | 10 Jul 2012 | 0 comments

Symantec’s latest Internet Security Threat Report Volume 17 showed that 2011 saw an increase in targeted attacks, and  18 percent of these targeted attacks were directed at businesses with 250 or fewer employees. Now that we’re halfway through the new year, how do things look for SMBs? According to the latest Symantec Intelligence Report – not good.

Targeted attacks still increasing

After reaching a record high in December of 154 attacks per day, daily attacks dipped briefly in January before returning to similar levels in February. For the most part, the daily attack average remained around this level for the first half of 2012 resulting in an average increase in targeted attacks per day of around 24 percent for the first half of 2012.

Attacks against SMBs double

Over the last six months, the number of attacks against SMBs has doubled, jumping to 36 percent compared to the 18 percent we saw just...

khaley | 29 Jun 2012 | 0 comments

Now is not the end. It is not even the beginning of the end. But it is, perhaps, the end of the beginning. Apologies to Winston Churchill, but recent events make this quote seem quite appropriate. Despite the initial hype, Flamer does not indicate the end of the world is upon us. Flamer actually indicates the end of the beginning.

It is the end of ignoring the risk of malware stealing your information. Hopefully. Flamer is completely over the top in how it steals information. But it’s certainly not the first piece of malware designed to steal information. There are thousands of them. Flamer is unlikely to be targeted at you. But one of those other ones probably is.

It is the end of antivirus...

Symantec Corp. | 13 Jun 2012 | 0 comments

 

By Brian Burch, vice president of marketing communications, Symantec

We’ve all heard about how regular forest fires clear the way for new life, making a healthier ecosystem overall. And if there is a silver lining to be found in the struggling global economy of the last few years, it’s the emergence of a new breed of entrepreneurs who are utilizing the latest technology to effectively compete in today’s challenging business environment. These “accidental entrepreneurs” found themselves in a difficult economic situation and decided to make their own opportunities.

The millions of white-collar workers who were laid off between 2008 and 2011 certainly play a big part in rising global unemployment, which is now totals 27 million more people than on the eve of the global economic crisis in 2007. But a subset of these individuals, those who founded small businesses in the wake of the economic crisis, are a positive and...

Tim_Matthews | 12 Jun 2012 | 1 comment

 

In a recent court case U.S. v. David Nosal, Judge Alex Kozinski ruled that the Computer Fraud and Abuse Act (CFAA), the nation’s anti-hacking law, applies to people accessing data by circumventing technological access barriers, but it does not extend to employees violating their employer’s restrictions on the use of that information. Under the new interpretation, an employee who has valid credentials to access company data and then misuses that data, however inappropriately, cannot be prosecuted under the CFAA. However, an employee who has valid credentials to access a company computer, but hacks into company data for which he does not have authorization can be prosecuted under CFAA.

The reason for the new interpretation, according to the ruling summary, was that using the CFAA to take action against employees that violate use restrictions could lead...

John_Brigden | 07 Jun 2012 | 0 comments

This blog is the first in a regular series of posts that spotlight how you can manage the kaleidoscope of change taking place right now in your organisation.

No matter who I talk with at the moment, be it customers, analysts or press, the message is the same: Bring Your Own Device (BYOD) is the hot topic. Challenges abound and people’s angst is rapidly moving beyond simply the device to the business: companies can only allow business to take place on the device if it is secure. According to the Symantec 2012 State of Mobility Survey of more than 6,000 businesses worldwide, most organisations are now commonly making line-of-business applications...

Guido Sanchidrian | 24 May 2012 | 2 comments

The last few days I spent some time to digest the latest Symantec Internet Security Threat Report Volume 17. This comprehensive report provides an overview and analysis of the year 2011 in global threat activity. The report is based on data from the Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in attacks, malicious code activity, phishing, and spam.

I am an active member of the Cloud Security Alliance Mobile Working Group, where we actually do research on secure mobile endpoint computing, which will result into valuable guidelines to be published this year. Therefore my Threat Report reading was likely shorten through the lens of...

Steve Cullen | 18 May 2012 | 0 comments

One of the great challenges businesses face today is enabling productivity by giving people access to the resources they need, without compromising the safety of that information. And while it’s not always easy to see the risks, recent events have made it obvious that disaster can strike at any time, in many different ways. It’s vital for organizations of all sizes to have a plan in place to keep their business operational when things go wrong.

Complicating the situation are several megatrends that are having a significant impact on IT today: namely, virtualization, cloud and mobility. These technologies are giving even small businesses the flexibility they need to compete better in a global market, but how are they affecting our ability to...