Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
The Confident SMB
Showing posts in English
Paul Wood | 21 Nov 2012 | 0 comments

Our latest intelligence figures show that SMB spam is down by 10 percentage points over last month, dropping to 65.2 percent of email traffic in October. And when you look at the SMB spam trends over the last two years, we’ve tracked a significant and steady decline (see figure 1). This is good news overall and indicates that persistent efforts to uncover and shut down such botnets should continue to pay dividends. But, it doesn’t mean we should be any less vigilant, especially as we enter into the holiday season which is traditionally rampant with spam messages targeted toward holiday events. With many companies running skeleton crews during the holidays, cybercriminals also take the opportunity to launch targeted attacks. They often try to mask these targeted attacks with noisy distributed denial of service attacks (DDoS) while trying something more sinister behind the scenes. Simply put, the bad guys are not on holiday.

...

Chris Halcon | 19 Nov 2012 | 0 comments

The holidays are right around the corner and as the owner of a small business, you most likely rely on online sales and interactions to drive growth and exposure for your company. That being the case, it’s more important than ever that you take steps to make sure your website is ready to handle increased online shopping. You can start preparing for the holiday shopping season by reviewing our 10 Tip to Keep Your Business Website Safe infographic.

The growing frequency and severity of cyber attacks puts online data and transactions increasingly at risk. One of the best ways you can protect your business and your customers is by protecting your site with strong authentication and Secure Sockets Layer (SSL) certificates (basically, ensuring that people who access your site really are who they say they are).Unfortunately, like many SMBs, you may have limited resources, which in turn means limited or no...

Steve Cullen | 15 Nov 2012 | 0 comments

There’s a lot of talk about cloud security be it (1) security for the cloud, which protects your cloud initiatives such as data stored in the cloud or (2) security from the cloud, also known as security-as-a-service (SecaaS), which uses the cloud to deliver some aspect of protection, like messaging, anti-virus or web security. Though proven and effective, many SMBs overlook SecaaS because the cloud still feels like an unknown for many, and we naturally fear what we don’t understand.

Today, SMBs can’t afford to be dismissive when it comes to security. The harsh reality is SMBs have never been targeted with attacks like they are now. In the first half of 2012,...

Symantec Security Response | 14 Nov 2012 | 0 comments

Cybercriminals have for some time now recognized that ransomware can be a highly profitable endeavor. This has led to a significant increase of different ransomware in the wild with no sign of it leaving the threat landscape anytime soon.

So, how effective is ransomware on Windows 8 compared to other operating systems? To answer this question, Symantec ran several prevalent ransomware samples currently found in the wild in a default Windows 8 environment. While some samples ran poorly on Windows 8, it did not take long to find a ransomware variant (Trojan.Ransomlock.U) that successfully locked a Windows 8 system, effectively holding it to ransom.
 

Figure. Ransomware-locked Windows 8 system...

Chris Halcon | 23 Oct 2012 | 2 comments

This blog was written by Jordan Usdan, Director of Public and Private Initiatives, FCC and originally posted on the FFC website

Small businesses are more dependent on the Internet than ever before, but 83 percent don’t have a formal cybersecurity plan to protect against cyber threats.[1]  As larger companies improve cyber defenses, American small businesses are now more vulnerable targets.  According to Symantec, they were subject to hundreds of millions of cyber threats in just the first few months of 2012.[2]  A typical cyber-attack can cost a business on average, close to $200,000 – enough to put many of them out of business.[3]

This week, the FCC is re-launching the Small Biz Cyber Planner 2.0, an online resource to help small businesses create...

khaley | 17 Oct 2012 | 0 comments

By visiting which type of website are you more likely to get infected with malware?  A religious site or an adult site?  I’ve been asking that question to computer security professionals for almost a year now.  If you’ve read the Internet Security Threat report version 17 you know the answer. It’s religious sites.  We discovered that a higher percentage of religious sites have been hacked into and loaded up with malware by the bad guys than adult sites.                                                                     

I like to quiz people on this one, because it doesn’t meet expectations.  Some people sense a set up in the question, but most answer that you’...

Chris Halcon | 04 Oct 2012 | 0 comments

For nearly 10 years at Symantec, Jay Epton has been successful in various UK and European channel-focused roles at Symantec. In 2011, Jay took on the responsibility for Symantec’s MSP strategy in EMEA and now leads the SMB and Distribution Business in the UK & Ireland, Sweden, Denmark, Norway and Finland. Over the past year, he has led continued and impressive growth of Symantec’s MSP partner program in EMEA and is on target to continue this trend into 2013. It’s leaders like Jay who have are being recognized as part of the fifth annual MSPmentor 250 list.  

The fifth annual MSPmentor 250 report is...

andysinger | 25 Sep 2012 | 0 comments

Symantec Endpoint Protection Small Business Edition 2013 Is Here

We listened and it’s here; Symantec Endpoint Protection Small Business Edition 2013 is available and ready to protect your businesses’ most critical asset –information.  We’ve simplified information protection with this new product built specifically for small- to medium-sized businesses (SMB). Symantec Endpoint Protection Small Business Edition 2013 gives you choice in deployment options, all in one product.  The solution can be deployed as a cloud-managed service or using our cloud-ready on-premise management option that makes it easy for an SMB to move to the cloud at a later date.  The new service installs in just minutes and also features enhancements to meet the system needs and security challenges you face today including support for Windows® 8 and new USB device control.

Bare Minimum Security No Longer an Option...

Symantec Security Response | 06 Sep 2012 | 0 comments

In July, Symantec reported that targeted attacks against SMBs had more than doubled since the beginning of the year. While the cause of this increase isn’t completely known, it is likely based on the perception that small businesses are an easier point of entry for an attacker into an industry. Given that many SMBs don’t have commercial-grade security, these small businesses could be seen as a weaker link or stepping stone in the supply chain. New data from Symantec security response seems to support this idea.

In 2009, we saw the start of high profile attacks by a group using the Hydraq (Aurora) Trojan horse. We've been monitoring the attacking group's activities for the last three years as they've consistently targeted a number of industries. These attackers...

Grant M Symantec.cloud | 28 Aug 2012 | 0 comments

 

The IT-related challenges small- to medium-sized businesses (SMBs) face can be very different than those of enterprises.  SMB owners are likely juggling multiple roles as business owner and manager, lawyer, accountant, IT manager and HR manager.  And if an SMB is lucky enough to have dedicated IT staff, they also tend to be stretched pretty thin.

Last fall, we began a variety of SMB-specific initiatives, led by our dedicated SMB team, to help SMBs safeguard their information by providing 360 degrees of protection — from Web browsing and online transactions, to email and collaboration, to backup and recovery.  Our SMB customers are looking for speed, ease of deployment and a simple and easy user experience when selecting solutions to safeguard their information.  We’ve taken quite a few steps to develop products with these features top-of-mind,...