Video Screencast Help

Security Risks

Results for Security Risks

Lately it has been noticed an increasing spread of threats which, entering a system by various means are encrypting several files on the attacked system like office documents, database files, e-mail archives, which represent a value for the attacked ...
Article by vik-svo | 13 Jan 2014 | 6 comments
This needs to be returned to SEP.  It's a major missing component and will cause us to change products when our support expires.  If you're not sure this is important, please check the forums where other admins are posting the same sentiment. ...
Idea by Russ Mazzaro | 08 Jan 2014 | 8 comments
I need a solution I have a general question regarding the uprgade process and potential system vulnerabilities. We manage thousands of endpoints and some of the users are very touchy ...
This issue has been solved
Forum Discussion by Gail_Richardson | 08 Jan 2014 | 5 comments
Introduction This is the fourth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it functions). The first article, Using ...
Article by Mick2009 | 06 Jan 2014 | 8 comments
Hi,   I would find that SEP should include features that govern the web access and prevent harmful website access. It is rather hard to explain to user when it get infected from a harmful website, and the website obviously harmful and the ...
Idea by John999 | 03 Jan 2014 | 2 comments
I need a solution Is a reboot necessary after upgrading from SEP 12.1.2 to 12.1.4? If user did not restart the machine after the successful upgrade, what are the services that will ...
This issue has been solved
Forum Discussion by baikai_bt | 03 Jan 2014 | 8 comments
Online gaming - "En Taro Adun" to the Part 5 of the Security 1:1 Series Online gaming just like any other branch of internet community is being targeted for scam, fraud and hacks. Few years back the scope of the scams involving ...
Article by SebastianZ | 02 Jan 2014 | 0 comments
Welcome to the Security 1:1 - Part 3 In part 3 of the series we will discuss various types of network attacks. On this occassion I will introduce as well some types of attacks directed more at end-user than at network or host computers - we ...
Article by SebastianZ | 27 Dec 2013 | 1 comment
Welcome to the Security 1:1 - Part 2 In Part 2 we take a closer look at Trojans - what is a Trojan? Why is it different from a virus? What are the types of Trojans based on their function and attack vectors. The introduced classification of ...
Article by SebastianZ | 26 Dec 2013 | 0 comments
Welcome to the Security 1:1 series of articles In Part 1 we start right off with Viruses and Worms - get to know the definitions and what differentiates them. Nowadays both terms are quite often used interchangeable but there are still ...
Article by SebastianZ | 25 Dec 2013 | 1 comment