Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Inside Symantec Community Blog
Showing posts tagged with Data Loss Prevention (Vontu)
Showing posts in English
Eileen | 01 Jun 2009 | 4 comments

Here are a few tips and tricks that might come in handy as you get started on Symantec Connect.

Profile - Located under the "Me" menu item, in the upper right hand corner of the site, you can upload a photo, keep track of your rewards points  and customize your subscriptions to community newsletters.  Just select the "edit" tab within your profile and start customizing.

Private Messages - To send another user a private message click on the user name, and then select "send this user a message."

Notifications - Keep track of a thread you started, a post of interest or a topic by selecting "Subscriptions" when posting a new forum discussion or comment.  Subscriptions are also available in other sections of Connect (i.e. articles, blogs, videos, downloads, events and ideas).  You can even...

Prasad Prabhu | 29 Mar 2012 | 0 comments

http://www.arnnet.com.au/article/419879/cost_data_...

Please read it from the above link.

Cost of data breaches in Australia going up, criminal attacks to blame: Symantec

Latest research from security vendor find that data breaches are increasingly becoming costly for local businesses
David Krauss | 13 Apr 2009 | 1 comment
As resources in the financial services industry continue to become even more strapped, institutions are turning to outsourcing as a way to reduce costs.
 
Sure, outsourcing sounds like a good plan, but how do you know you can trust your outsourcing partner? Often times, when entering into a third-party service contract, security is an afterthought. To ensure your institution is not the next to make headlines due to a data breach, I have included below a list of best practices to help you get ready to enter that third-party vendor agreement:
 
  1. Get your own house in order – review and revamp your own security strategy before locking down the vendor chain.
  2. Classify your data and apply the right controls – all data in an institution must be profiled and classified. Institutions will need to know and understand their data, as well as set classifications for more...