Video Screencast Help
Security Community Blog
Showing posts in English
Philip Routley | 24 Nov 2013 | 0 comments

“What’s the worst that could happen?” It’s one of those hackneyed phrases we’ve all grown tired of. But for small businesses, when it comes to cyber-crime and the threat it poses to commercial success and maybe even survival, this is exactly the sort of question you seriously need to ask yourself.

Small businesses are increasingly the prey of choice for clever, callous, determined cyber-criminals worldwide, with a rising tide of firms paying a crippling price for not putting effective defences in place. Take the firm that had key financial data locked by a ‘ransomware’ attack and caved in to a demand for $3000 to release it – a hefty bill no doubt compounded by the cost of business downtime, system clean-up, damaged reputation and the sheer trauma of this sorry saga. Or take the...

dougbowers | 18 Nov 2013 | 0 comments

Most people today rely on email as their method for business communication – sending and receiving hundreds of emails every day. This dependence on email can create a weak link in securing corporate information and expose a company to attacks. While hackers still use general spam emails and social engineering (or phishing) attacks against organizations, they are now increasingly pursuing sophisticated and targeted attacks that are far more difficult to differentiate from the emails we typically receive. In fact, Symantec’s 2013 Internet Security Threat Report found a 42 percent increase in targeted attacks in 2012.  

Most spam emails are relatively easy to identify and quarantine, but targeted attacks are customized for their recipients, making them harder to spot. For example, a company’s HR department could receive an email that requests that they click on a...

megamanVI | 07 Nov 2013 | 3 comments

Cryptolocker (http://en.wikipedia.org/wiki/CryptoLocker) is a new malware that surfaced recently. It is wreaking havoc on Windows file shares and locking people out of their files. The malware encrypts commonly used documents and prevents the user from accessing them. The malware will then attempt to extract payment from you to unlock your files. Arstechnica has a great writeup on this (http://arstechnica.com/security/2013/10/youre-infe...).

 

Some tips on dealing with this malware:

  1. Ensure your virus protection is up to date
  2. Restrict workstation permissions so that the general users have limited access rights...
Amanda Grady | 04 Nov 2013 | 0 comments

 

As we announced in 2011, Symantec Message Filter powered by Brightmail is discontinued for Enterprise, Mid-market, and Small Business customers. If you are an existing customer with a current subscription, you can continue to use the Symantec Message Filter version 6.3 until the end of your current subscription or the End of Support Life. You will need to migrate to an alternative product no later than the time of your next renewal.

In order to enable earlier migration, most existing customers with a current subscription are now entitled to migrate to the Symantec Messaging Gateway appliance product. Symantec Messaging Gateway offers superior functionality that includes the same 99%+ effectiveness against spam, malware and phishing messages, as well as rich reporting and centralized management, advanced threat protection, integrated MTA, content filtering, data loss prevention capabilities, LDAP integration, native TLS support...

Chad Dupin | 30 Oct 2013 | 0 comments

Stump_The_Chump_Header.jpg

Register Today

We are playing Eye Of The Tiger to get ready for Stump The Chump: SEP Style

Want to know something specific about Symantec Endpoint Protection (SEP)? Think you know something about architecting, installing, configuring, or administering SEP that nobody else does?  If you stump the chump, it’s worth $20 at Best Buy.

James Lanning of ITS Partners (a.k.a. "The Chump) will be hosting a webinar event during which you will have the opportunity to him ask any architecture, installation, configuration or administration-related question about the latest version of SEP. If he doesn’t know the answer...

Teresa Law | 28 Oct 2013 | 0 comments

See our 5 best practices to stay safe online and test your cyber awareness at https://www.staysecureonline.com/

According to the United States Department of Homeland Security, cybercrime is one of the main focuses for Cyber Awareness Month:

Cybercrime - Focuses on national and local efforts to prevent traditional crimes like theft, fraud, and abuse that can also take place online

The number of cybercrimes have been going down according to the 2013 Norton Cybercrime report. However, that still equals more than 1 million victims per day globally and $113 billion USD annually, which is enough to host the London Olympics 10 times over.  Although the number of victims were down, the cost per individual has risen by 50...

Mithun Sanghavi | 28 Oct 2013 | 30 comments

Hello,

Symantec Endpoint Protection 12.1.RU4 has been released on October 28' 2013.

You may find the latest release, Symantec Endpoint Protection 12.1.RU4, here:

https://symantec.flexnetoperations.com/control/symc/registeranonymouslicensetoken

SEP 12.1.4.jpg

 

This build's version is: 12.1.4013.4013.

This release provides extended Mac protection, Mac OS 10.9 support, Microsoft Windows 8.1 support, and security improvements, by including the following new features:

  • Support for Mac OS 10.9 “Mavericks”.

  • Mac IPS protection – Network Intrusion Prevention System based on signatures where each...

Avkash K | 22 Oct 2013 | 0 comments

Hi All,

I just received one report on Conficker virus and lessons learned from the same which i thought of sharing over here.

This report is prepared by Conficker working group, and Symantec is a Conficker working group member.

This report covers the evaluation and detailed analysis of conficker virus.

Also you can find that how symantec has contributed in this fight against conficker.

Teresa Law | 21 Oct 2013 | 0 comments

The theme for week three according to the United States Department of Homeland Security focuses on the following:

Education: Highlighting the importance of cyber education and workforce development, including the advancement and opportunities in Science, Technology, Engineering, and Math (STEM) education.

Cyber Awareness should be a priority for everyone in their business and personal lives.  Cyberattacks and cybercrime are on the rise with ransomware and phishing schemes targeting us as we interact with each other online and targeted attacked toward businesses resulting in loss of intellectual property, reputation, or perhaps most distressing of all information about us (social security numbers, credit card numbers, etc.).

However, cyber awareness is not limited to protecting against cyber attacks.   Cyber awareness also means protecting ourselves and...