Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Inside Symantec Community Blog
Showing posts tagged with Best Practice
Showing posts in English
David Krauss | 18 May 2009 | 1 comment

In my last post which focused on outsourcing, I highlighted the cost savings that can result from financial institutions implementing proper outsourcing practices. Virtualization is another technology that allows financial institutions to save not only money, but precious IT hours while helping an institution become more agile and employees more productive.

Virtualization benefits include:

  • Reduced IT Costs - Server and endpoint virtualization offer financial institutions a streamlined, automated and cost-effective way to deploy and support both computing resources and users, while also meeting regulatory requirements for privacy and reporting.
  • Increased Security – Institutions face the challenge of managing several branch offices and remote employees scattered across the globe. Such a complex management environment is filled with insecurities and inefficiencies, but leaving security to users can be infinitely...
David Krauss | 13 Apr 2009 | 1 comment
As resources in the financial services industry continue to become even more strapped, institutions are turning to outsourcing as a way to reduce costs.
Sure, outsourcing sounds like a good plan, but how do you know you can trust your outsourcing partner? Often times, when entering into a third-party service contract, security is an afterthought. To ensure your institution is not the next to make headlines due to a data breach, I have included below a list of best practices to help you get ready to enter that third-party vendor agreement:
  1. Get your own house in order – review and revamp your own security strategy before locking down the vendor chain.
  2. Classify your data and apply the right controls – all data in an institution must be profiled and classified. Institutions will need to know and understand their data, as well as set classifications for more...
LeslieMiller | 18 Mar 2009 | 8 comments

So, you’re wondering what the difference is between a forum post, an article or a blog. Or maybe you want to know what constitutes a download. Check the information below for brief explanations. Then, start contributing! All of the content types below are worth Connect Points. And hey—not that you need reminding, but here it is just in case:  All information MUST be your own, original work. Make sure that the information is not plagiarized or otherwise copyrighted elsewhere—cause that would just be wrong!

Forum discussion threads may be questions, or otherwise pertinent information that is of interest to the community and is intended to start a discussion. If you’re looking for the answer to a question, consider adding the following information to your post to help out those who just may have the solution.

  • Product Name and Version
  • Platform Name and Version
  • Exact...
Deirdre Sena | 10 Mar 2009 | 0 comments

This month, Microsoft issued three security bulletins that address a total of eight vulnerabilities, one of which is rated as critical. Symantec expert Ben Greenbaum, a senior research manager, shares his expertise on the vulnerabilities in a quick video segment included here.

This month’s critical vulnerability can allow an attacker to gain complete control of a user’s machine if they open an HTML e-mail, e-mail attachment or visit a Web site infected with a .WMF or .EMF picture file.

Symantec strongly encourages users to patch their system against these vulnerabilities. In addition, enterprises are encouraged to consider implementing an automated patch management solution to help mitigate risk.