Video Screencast Help

Search

Search results

“A perpetual tsunami.”   That’s how IDC describes the current growth of digital information throughout the world.1   It may be an understatement.   IDC estimates that last year, despite the global recession, the so-called “Digital Universe” ...
Blog Entry by Ctrox | 18 Aug 2010 | 0 comments
Virtualization introduces new challenges into IT environments as they become increasingly both physical and virtual. Here are five in particular that you need to be aware of as you deploy – or continue to deploy – virtualization. Has any topic ...
Blog Entry by Ctrox | 18 May 2010 | 1 comment
Symantec has released its latest Internet Security Threat Report (ISTR XV).  The report is a recap of all of the threats posed to businesses and consumers in 2009.  The ISTR is a great tool for SMBs to use in educating their employees on the threats that ...
Blog Entry by Ctrox | 26 Apr 2010 | 0 comments
There’s an old saying in security circles: Once something’s popular, it’s only a matter of time before the bad guys show up. The latest example: Twitter, the wildly popular microblogging site that lets you know what your friends are doing. First came ...
Blog Entry by Ctrox | 09 Feb 2010 | 0 comments
Recently, Symantec convened a panel of researchers to review the 2009 threat landscape and to discuss what we can expect in 2010. The group was unanimous in saying what we saw this year was ugly. Botnets prevailed and took over as a primary means of ...
Blog Entry by Ctrox | 09 Feb 2010 | 6 comments
The emails arrive bearing subject lines such as “State Vaccination H1N1 Program,” “Governmental registration program on the H1N1 vaccination,” and “Create your personal Vaccination Profile.” Purportedly from the Centers for Disease Control, the messages ...
Blog Entry by Ctrox | 09 Feb 2010 | 0 comments
Never at a loss to cook up new and ingenious scams, cyber-criminals are using increasingly persuasive online scare tactics to convince users to purchase rogue security software. Rogue security software, also known as “scareware,” pretends to be ...
Blog Entry by Ctrox | 09 Feb 2010 | 0 comments