Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
The Confident SMB
Showing posts tagged with Security
Showing posts in English
Solange Deschatres | 03 Jun 2014 | 0 comments

Policies.pngA zero-day attack is one of the biggest dangers to businesses online. Whether in the form of a worm, virus, Trojan or anything else, it’s a targeted attack that exploits a software vulnerability that was previously unknown, so it’s able to hit and spread before the software’s programmers have had even one day to try to fix the flaw – hence the zero-day name.

Zero-day attacks are quickly fixed with a patch once discovered, but their damage is mostly done in that short period of total vulnerability – and it can be devastating.

According to Symantec’s Internet Security Report, targeted attack campaigns rose by 91% in 2013, with a 62% increase in the number of successful breaches. A total of 23...

Chris Halcon | 24 Jul 2012 | 0 comments

The number of targeted attacks against SMBs has more than doubled in the last six months. This alarming new statistic combined with the fact that many SMBs are unaware of the threat was the key driver behind our latest SMB Twitter chat.

Last week, Symantec’s SMB security experts, Kevin Haley and Andy Singer, engaged with Small Business Trends’ Editor-in-Chief Anita Campbell for a Twitter chat about targeted attacks and SMBs. The chat covered a variety of topics including the likelihood of an attack, common types of attacks and how to mitigate threats.

The chat drew more than 100 participants which included SMB owners and thought leaders who discussed the current threat landscape for SMBs. The chat produced more than 800 Tweets and for the first time since we started holding SMB chats, the hashtag #SMBchat...

Chris Halcon | 16 May 2012 | 1 comment

Lost or stolen devices and mobile malware are significant concerns for small businesses. Symantec’s recent Smartphone Honey Stick Project found that there is a very high likelihood attempts to access both sensitive personal- and business-related information will be made if a lost and unprotected smartphone is found by a stranger.

On May 2nd, two Symantec security experts joined Anita Campbell, editor-in-chief at Small Business Trends, in a Twitter chat to shed some light on how to secure and protect mobile devices and the business data accessed and stored on them.

The #SMBchat generated some lively discussion and included some useful stats and tips for SMBs. In case you missed...

Blake M | 07 Oct 2010 | 0 comments

Is freeware really free?  That is the question small businesses should be asking when it comes to protecting their customer and other proprietary information, such as bank and credit card account details.

Small businesses are looking for the best deal in security software due to tight budgets.  We’re all looking for ways to do more with less.  However, how does a small business owner explain to a customer that their personal data was breached due to the fact that the “free” security solution that the business installed didn’t protect them against the latest threat?

The best analogy I have heard in the “to use or not to use freeware” debate is from Symantec’s Janice Chaffin.  Chaffin recently said, “Free AV is very basic.  It's like wearing a light windbreaker in...

Blake M | 01 Oct 2010 | 0 comments

The fast growth and increased popularity of social media sites has impacted the lives of just about every Internet user – and just about every business that has an online presence.  Networks like Facebook, Twitter and the blogosphere reach millions of people every day, making them a valuable tool for organizations all over the world.  But the question is: Are these sites helpful to small businesses?  If so, how has social media assisted you in connecting with customers and even your company’s own employees?  And if not, are there tools your competitors are using that you should consider?  How do you ensure that you are using proper security measures to protect against social network-related threats?

Think back 10 or 15 years.  How has communication changed for you in the workplace?  Would you ever have thought that you’d use your mobile phone to edit documents or send e-mails?  What about social networking?

...