• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos0

2014 Mobile Trends: Norton at CES

Mobile technologies sure-to-trend in 2014 include "smart" connected devices and wearable gadgets. With 2.88 billion people reached by the #CES2014 hashtag, according to the Consumer Electronics Association, this new tech is growing in popularity in no time. Watch the best-of from Norton at CES. Did you miss the Norton Truck interactive mobile privacy experience at CES? You can still try Norton Mobile Security for free, here: https://mobilesecurity.norton.com/  Read on for more quick tips to protect your mobile privacy: Protect your private info: Did you know? 1-in-4 smartphone user...
Read More
Kudos0

Stay Safe in Sochi

As a tourist in a foreign city, especially a chilly one hosting hundreds of thousands of people from all over the world this weekend, it’s probably wise for you to learn a few key phrases to protect yourself, like: Спасите! (Spasite!) “Help!” Пожар! (Požar!) “Fire!” Стой! (Stoj!) “Stop!” …but, what if you need to protect your mobile device or laptop? These phrases are pretty ineffective against cyber crimes.  The U.S. Computer Emergency Readiness Team reports that possible targeted attacks could appear in the form of spam, phishing scams, fake websites, or drive-by download campaigns, an...
Read More
Kudos2 Stats

Symantec recommends WinXP customers upgrade their OS

After April 8, Microsoft will no longer release updates designed to fix bugs that cybercriminals use to gain access to the operating system (OS). Any newly discovered vulnerabilities in the operating system will effectively become an open invitation to an attacker to gain control of a computer running Windows XP. Symantec strongly recommends that Windows XP customers upgrade to a current OS as soon as possible, but will continue to support Windows XP SP3 systems for the foreseeable future. SavvyMediaGal recently posted a Norton Protection Blog entry titled, “How will the end of Microsoft ...
Read More
Kudos0

Why Symantec Says That The Covert Redirect Flaw in OAuth and Open ID is 'Not As Bad As Heartbleed'

Some media outlets are sounding the alarm about the recently discovered Covert Redirect flaw in OAuth and OpenID being “the next Heartbleed.” Symantec experts have assured people that it’s not. What is this Covert Redirect flaw? The vulnerability exploits web and mobile applications that allow users to login via OAuth (an application that lets 3rd parties access account details from other websites, such as social media sites). It allows attackers to disguise a fake login popup, using the affected website’s real domain. These attackers can collect login information from users if they autho...
Read More
Kudos1 Stats

Time-Saving Software To Simplify Your Life

There’s no doubt that technology has made many areas of our lives simpler. We can now access files from any device, anywhere, and we can take full advantage of fast internet speeds to do things that weren’t possible just a few years ago. But as we use more technology, that simplicity can be eroded as our devices demand monthly, weekly, even daily updates. Our software applications add new features we didn’t ask for but have to learn and our documents move from one hard disk to multiple locations around the cloud, each with their own logins and capacity limits. Technology can greatly impro...
Read More
Kudos0

Will Amazon’s Fire Phone "Burn" Users?

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone. For the original article, and to catch the latest security intelligence information, check out Symantec's Security Response blog: http://www.symantec.com/connect/blogs/will-amazon-s-fire-phone-burn-users     Everyone has heard stories about smartphones with malfunctioning battery packs bursting into flames, but the new Amazon Fire Phone, despite its name, could pose a different kind of danger. Amazon’s recently announced device is due to be released in July and may present some pote...
Read More
Kudos0

Mobile Security Resolutions for the New Year

  Welcome to the new year! Now that the holidays are a wrap if you're like many, you may have received the gift of mobile this year. In fact, 74% of U.S. consumers intended to give consumer electronics as presents (CEA). But while new mobile trends are in fashion for 2014, mobile cybercrime threats are trending also. More than 1/3 of smartphone users have experienced mobile cybercrime (2013 Norton Report). That means, resolution number one on your list should be to security protect your shiny, new mobile devices and tablets.     Mobile Malware: How-to Protect Your Smartphone and Tablet ...
Read More
Kudos0

Lunar New Year Security Checklist

Because you should be spending your time enjoying the festivities, here are a few security tips for Lunar New Year. Wishing you a fun, safe celebration and year ahead from Norton! Will you capture irreplaceable memories this Lunar New Year? Try Norton Zone for free, a safer and easier way to share files with family and friends.
Read More
Kudos0

Malaysia Airlines Flight MH17 Social Media Scams and How-to Protect Yourself

As reported by BBC, scammers are capitalizing on the destruction of Malaysia Airlines flight MH17 via social media posts promising video footage of the incident. Instead, these posts are linking social media users to spam or offensive content. The Australian Competition and Consumer Commission also reported that fake tribute Facebook pages have been created by scammers to re-direct people to websites with dubious advertisements, where scammers will profit on each advertisement click. While it is unfortunate that scammers would look to capitalize on this tragic incident, this is a common t...
Read More
Kudos2 Stats

System Admin Day 2014! Reasons to Thank Your System Administrator Today (and Everyday).

Today marks the 15th annual System Administrator Appreciation Day, and Norton wishes all those who keep our world of information up and running a big thank you and much deserved rock star recognition. To celebrate the day here are a few of the top reasons to say thanks. Thank your SysAdmin on System Adminstrator Appreciation Day! When your server goes down at midnight on a Saturday, a sysadmin IT pro has everything up and running by 9a.m. on Monday. That lovely interwebz connection you are accessing to view this very blog from your office network – all thanks to a sysadmin’s handiw...
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos4 Stats

New Zero Day Internet Explorer Bug

Norton users* can breathe more easily knowing that they are backed by Norton by Symantec’s gold standard of security in light of a security advisory about a new zero-day bug affecting Microsoft Internet Explorer. Other vendors are using the name “Operation Clandestine Fox” to identify targeted attacks using this bug in the wild.  Users of all versions of Internet Explorer are vulnerable, but, so far, this bug is not being used in widespread attacks.    Microsoft will be issuing a patch for supported operating systems, but Windows XP users will need to find another way to stay secure, as ...
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud? My answer? Absolutely not. Zone is only one cloud service, among many, that Syman...
Read More
Kudos0

3 Hot Mobile Security Tips For Summer Travel

Summer’s finally here, so whether you intend to take a picnic to the park, play with the children in the garden or jet off to somewhere even sunnier, some simple precautions will keep you and your devices safe this summer. Watch your devices First up, physical security. With more outdoor activity it’s natural that it won’t only be your smartphone that travels with you. Parks these days are full of tablets and even lightweight laptops, to go with the many Kindles and Bluetooth speakers, so it pays to be aware of just how valuable your possessions are. Don’t leave them lying in plain sight...
Read More
Kudos1 Stats

Android Security Bug Uses “Fake ID” To Access User Information

Mobile security firm, BlueBox has detected a security bug, dubbed, “Fake ID”, in all Android operating systems (OS) beyond version 2.1. This vulnerability could allow hackers to steal personal information, such as passwords or financial information, from Android users by creating an app that uses fake security credentials to access other apps on a user’s device. Earlier this year, Symantec’s Internet Security Threat Report noted that mobile malware in 2013 was developed almost exclusively for the Android OS, 32% of which steals a user’s personal information. Luckily, Google says that no e...
Read More
Kudos0

Five Ways to Save "Face" Online

There’s a reason why Facebook is celebrating it's 10th birthday today! Social networking sites are great for keeping in touch with friends and family, for telling people what you’re up to, and for finding out what’s happening in your part of the world. Though this does come with risks. Each time you post, “like”, share a photo or check-in somewhere, you’re providing a little more information about yourself. You’re discarding a little more of your privacy… and arguably, you’re leaving yourself at risk of identity theft. To help you on your way, here are our top 5 tips to help you enjoy y...
Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.     Follow these secure Wi-Fi ha...
Read More
Kudos0

5 Tips for smarter, safer mobile banking

The rise of the smartphone has brought countless technological benefits that make our daily lives easier in so many ways, and one of the biggest has been the freedom of mobile banking. Gone are the days of waiting in a busy branch on a Saturday afternoon to transfer money into your savings account, or calling an automated number to check your balance. But having your bank accounts within such close reach does bring its dangers, and it shouldn’t simply be assumed that logging in and doing your banking can now be done at any time and in any place. Here are five quick tips to keeping your mon...
Read More
Kudos3 Stats

Symantec Security Detects Dragonfly's Energy Sector-Targeting Cyber Schemes

New research from Symantec uncovering a cyber-espionage campaign that has affected 1,018 unique organizations across 84 different countries has demonstrated the impact of sophisticated phishing attacks and watering hole techniques. The attacker group, dubbed “Dragonfly” by Symantec security experts (other vendors have called them, "Energetic Bear"), launched a campaign against a range of targets, predominantly in the European and American energy sector, over a number of months. Dragonfly used multiple attack methods to install malware onto systems, extracting passwords and documents among...
Read More
Kudos1 Stats

Security Experts 'Pin' So-Called Miracle Diets As Social Scams

Obesity is a known topic of conversation in the United States, with one in three U.S. adults being categorized as overweight. Most of us have come across posts claiming to promote a new weight loss "miracle" in our online experiences. Healthcare experts are constantly reporting that there is "no such thing" as a miracle diet, but, much like a fabled lake monster, or a giant hairy beast in the woods, legends die hard.  Scammers are always trying to find new ways to lure in vulnerable dieters who still want to believe that an easy solution exists. They use social media as a vehicle to peddle...
Read More
Kudos1 Stats

Securing Your Small Business Social Media Plan

Today's social media is a crucial tool for business,  Companies that use Twitter, Facebook and other tools in an organised and efficient manner can achieve incredible engagement for relatively little cost, and (with a healthy dose of good fortune) a strong social media campaign can take off around the world and do more for brand recognition than traditional advertising. The key is finding the right balance between informal spontaneity and well-planned company output, and it’s a balance a huge number of businesses are finding hard to get right. Engaging with customers and listening to cons...
Read More
Kudos0

Prevent Scammers From Taking Over Your Company's Social Presence

Social media is a hugely important tool for growing your business’s brand, and the last thing you want to do is expose your customers to spam. Yet we’ve all seen it: the tweet promising thousands of new followers or the Facebook post teasing a way to lose weight or earn easy money – of course only if you’ll click on a link. It’s an issue that’s not going away any time soon, and it must be handled in the right way. The last thing we want to do is make our social media pages less open to the public, so instead we must use the settings available to us to keep spam away, and actively deal wit...
Read More
Kudos0

World Backup Day and Digital Spring Cleaning

March 31 marks World Backup Day! What is backup? It's a second copy of all your most important files like financial documents, family photos, videos and more. While it's best to backup your files regularly now is as good a time as ever.  Here are a few more tips for digital spring cleaning! Read on.    Five easy ways to get started on digital spring cleaning:   Be sure your software is up to date. Ignoring the latest software updates could put you at risk. Companies announce security vulnerabilities as they are discovered and quickly work to fix the vulnerabilities with software updates,...
Read More
Kudos2 Stats

Dr. Strangebug, or How I Learned to Stop Worrying and Accept Heartbleed

By Satnam Narang, Symantec Security Response expert. No matter where you went this week, you likely heard about something called Heartbleed. If you happened to be living under a rock (some might say you were better off there), you may not have heard that there was a major vulnerability discovered in OpenSSL, the open source implementation of the protocols used to secure communication over the Internet. The reason it received a lot of attention is because a half a million trusted websites were vulnerable at the time this news first came to light. Does this mean the Internet is broken or is...
Read More
Kudos0

Mobile Security Advice For The New Term

Technology and education now go together more closely than ever, with laptops and tablets now regular sights in classrooms. The range of educational apps in both the iOS App Store and the Google Play Store is huge and growing all the time, and the cloud has made it possible to learn across multiple devices with ease.   And yet, with such progress inevitably comes a downside. With all that extra work being created and stored on our phones and tablets, we have to think carefully about security issues. While your science project might not be the prize a hacker is after, losing it means more t...
Read More
Kudos2 Stats

5 Small Business BYOD Security Tips

The world of business has to move with the times, and right now that means it makes a lot of sense to allow staff to use whatever devices they have for work. BYOD – bring your own device – is here to stay, and if implemented properly can be a real boon to the productivity and happiness of your employees. They get to use a device they’re comfortable with, and you get to slash your hardware deployment costs. But BYOD brings with it new risks to the security of sensitive company data, with employees taking their main work systems out of the office with them at the end of the day. Rather than ...
Read More
Kudos1 Stats

Scammers' Tricks You Don’t Want To Be Fooled By

Unlike April Fools, which only happens once a year, scammers make a living off of fooling users 365 days a year. Here are a number of tricks that scammers use. Phishing Scams: Whether it’s pretending to be your financial institution or a tweet from someone you know, asking, “Is this photo of you?”, phishing scams are after your login credentials to sites that are important to you. Recently, users of Google Drive and Google Docs were targeted in a sophisticated phishing scam. Phishing remains one of the most common scams used because they work, and as these scams become more innovative, th...
Read More
Kudos0

Keeping Your Business Safe From Attack

According to the 2014 Symantec Internet Security Threat Report, which examines the data from more than 41.5 million attack sensors and records thousands of events per second, spear phishing is not dead – it’s merely evolving. The technique uses fake emails to target a specific organisation in order to gain access to internal data, and although attackers used fewer emails on fewer targets last year, the total number of spear-fishing campaigns was up a startling 91%. More user awareness and better security means attackers are simply choosing their targets more carefully and sharpening their ...
Read More
Kudos0

In Defense of Devices: Cyber Security Concerns Spread Beyond Your Phone

We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly. As the report states, last year saw high-profile hacks of baby monitors, security cameras and even home routers by cybercriminals. Meanwhile, security researchers dug around in the software of other devices...
Read More
Kudos1 Stats

Happy Thanksgiving!

Read More
Kudos0

How will the end of Windows XP impact you?

The clock is ticking down on Windows XP. Microsoft will end technical assistance for the 12-year-old operating system on April 8 and effectively stop delivering automatic updates and security patches to Windows XP users. Although many consumers, small businesses and even large enterprises have already transitioned to newer and more secure systems, an estimated 30 million desktop operating systems still run on Windows XP today and could be left vulnerable after April 8.  At Symantec, we firmly believe running up-to-date security products is a critical step in protecting your personal infor...
Read More
Kudos0

Smart Tips For Smart TV Watching With Dad

It’s Father’s Day once more on June 15th, but this isn’t any old Father’s Day – this one might as well have every dad’s birthday and Christmas Day rolled in as well. Yes, Father’s Day in 2014 falls right at the start of the World Cup in Brazil and on the final day of the US Open golf championship, which makes it all the more likely that dad will be settling down in his armchair to enjoy that new Smart TV he’s had his eye on. But as with anything that connects to the Internet, it pays to be aware of the security issues, and Smart TVs are no different. Only this week the news has been full ...
Read More
Kudos0

Quick Tip Guide to Kids' Social and Mobile Privacy

You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps. You can have the usual parent-child conversations about not chatting to strangers and not revealing too much about themselves, but sometimes the apps take matters into their own hands and give away more than they should. Check out these quick steps you can take to make socia...
Read More
Kudos2 Stats

Pandora #BoldlyGo Concert Series feat Thurston Moore

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by Thurston Moore, open to an intimate audience* of Norton, Pandora, and Thurston Moore fans! HOW TO ATTEND: On Monday, December 8 and Tuesday, December 9 be one of the first replies to our Daily #BoldlyGo Concert Series tweet, via @NortonOnline, and get free VIP access to see Thurston Moore in NY, NY Date: Thursday December 11th, 2014 Time: Doors at 7:00 pm Location: Marlin Room @ Webster Hall Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at Marlin Room @ Webster Hall 12/11/201...
Read More
Kudos0

Is connected car data the next privacy concern?

GPS devices have made driving so much simpler in recent years, and it’s hard to find a driver today who does not use one for long journeys. But what are the downsides to being constantly connected when driving? While you’re getting vital information to help you reach your destination, what vital information of yours is flowing the other way? One big car maker was recently forced to deny that it collects and shares personal data on drivers and their habits through their GPS devices, but we’ve seen time and time again that all that gatherable information can prove too tempting for a company...
Read More
Kudos0

How Can Small Businesses Develop Trust with Customers?

In a small business, your top priority when dealing with customers is trust. Recent high-profile security breaches have eroded consumer confidence, and it’s more important than ever to reassure your customers that they’re safe shopping with you. According to Symantec’s Sr. Director of Product Management, Robert Hoblit, the vast majority of visitors to any shopping site will arrive through web search or advertising, and first impressions are vital. “Around 80% of the customers that land on your website are actually first-time buyers,” he says. “They’ve never seen you before, they’ve never ...
Read More
Kudos1 Stats

Pandora #BoldlyGo Concert Series feat G. Love & Special Sauce

WHAT: Join us for the Norton #BoldlyGo Concert Series, an exclusive performance by G. Love & Special Sauce, open to an intimate audience* of Norton, Pandora, and G. Love fans! HOW TO ATTEND: From Monday, November 3 through Friday, November 7 be one of the first 5 replies to our Daily #BoldlyGo Concert Series tweet and get free access to see G. Love in San Francisco, CA Date: Tuesday, November 11th, 2014 Time: Doors at 7:00 pm Location: 777 Valencia St, San Francisco, CA 94110 Giveaway Details* U.S. only giveaway Must be 21+ years old Concert held at The Chapel in San Francisco, ...
Read More
Kudos1 Stats

Mobile Scams: How-to Protect Yourself

Malware apps With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone? To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Security and use it to scan new apps before you run them – you might be surprised what you find out.   Social media spam If you’re on Twitter you’ll know how annoying it is to b...
Read More
Kudos2 Stats

When It Sounds Too Good To Be True, It Probably Is (A Scam)

How safe was your family online in the last year? According to Symantec’s Internet Security Threat Report 2014, they weren’t as safe as you might think. The study analyses threat data from over 157 countries, more than 41.5 million attack sensors and a database of over 60,000 vulnerabilities, making it the most comprehensive picture of internet security in the world – and it says mobile users are falling for more “too good to be true” scams than ever. Bad behavior   An incredible 38% of mobile users have experienced cybercrime, and it’s often down to their own behaviour. More than half of...
Read More
Kudos0

'Backoff' Malware Steals Customer Credit Cards From 600 Stores

Last week, the Department of Homeland Security reported that around 600 businesses fell prey to a Point of Sale malware, called “Backoff”, that steals customer payment details through remote access applications. Most of the businesses affected were small, independent brick-and-mortar retailers, but some larger chains were impacted as well. The scope of the attacks could widen as more affected businesses are discovered. Unfortunately, this kind of criminal activity is growing. Identity theft, according to the Bureau of Justice Statistics, affected 16.6 million people in 2012. Hackers often...
Read More
Kudos0

Back Up Your Finals and Midterms to the Cloud

In today’s fast-paced world, you can be sure that most universities have gone digital. As a result, more students are saving their important papers on their computers and external hard drives. However, from what I’ve seen, that’s about as far as most students go to safeguard their work. With so many hours (and lost sleep) going into these papers, it is essential to make sure you have it backed up in the cloud, because there would be nothing worse than losing all of your hard work due to a computer crash or hard drive failure.   If you only save your work on a hard drive, once your compute...
Read More
Kudos1 Stats

Tips to Protect Your Financial Information

Protecting your financial information is important, and it doesn’t have to be difficult. When on-the-go tools such as mobile banking apps make managing financial tasks easy, you should also take precautions to manage the risk of accessing sensitive financial information anytime, anywhere. This Credit Education Month, practice safe online habits with a few easy tips. Taking Basic Security Precautions Take precautions to make sure that your online financial management activities are secure. Be aware and vigilant by practicing these safe online habits: Make sure the websites with which you...
Read More
Kudos0

Cybersecurity Trends and How-to Protect Your Business

Information security is more important than ever when it comes to safeguarding small business. According to the Symantec Internet Security Threat Report a noteworthy 30% of all spear-phishing attacks were aimed at small businesses in 2013, while one in five small businesses received at least one targeted spear-phishing email. In 2014, we identified a few technology trends that will have a direct impact on small businesses and the way they protect business critical information. All eyes will be on protecting Privacy From scary headline news to a much-needed wake-up call, consumers and sma...
Read More
Kudos0

5 Tips for Social Media Security and Privacy

Social media accounts are powerful tools in the wrong hands. We’ve recently seen hackers take over the Twitter accounts of media outlets and large corporations, using them for anything from basic spam to drawing attention to global issues. Your own accounts might seem too small to tempt scammers, but even with just a few followers your information is a valuable commodity. Read on for tips to stay safe on social networks.   Use unique passwords for each social network It’s a pain, but it is also absolutely essential that you don’t use the same password for Twitter as you do for, say, Facebo...
Read More
Kudos2 Stats

Antivirus-Only Is Dead. Long Live Security!

Are you doing enough to keep your information safe? With today’s sophisticated cyber threats you need more than just traditional antivirus (AV) software to stay protected. AV software can prevent, detect and remove malicious computer programs, and while more traditional viruses and email spam still exist, people now have more complex threats to worry about – and more important information to protect.  You need to guard your devices from not only viruses and worms, but web threats, spam and phishing. Cybercriminals can also use drive-by methods for stealing information and concealment malw...
Read More
Kudos1 Stats

New Year’s Resolutions – There’s An App For That!

As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful t...
Read More
Kudos0

Top 10 "Riskiest" Websites

We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Software is constantly changing, and it takes time and resources to keep a website running on the latest, fully patched software. According to Symantec’s security expert, Kevin ...
Read More
Kudos2 Stats

Heartbleed Bug: What You Need to Know and Security Tips

What is Heartbleed? Symantec is continuing to track this OpenSSL bug discovered recently and its implications for consumers. Symantec has created a site devoted to Heartbleed for further information. Watch to learn more: "Heartbleed" a name that security researchers have given to a serious bug found in a very common piece of software used by many websites. The software in question is called OpenSSL and is used to encrypt the information that you send to and from websites, such as your login name and password or other sensitive information. You can usually recognize when websites encrypt...
Read More
Kudos2 Stats

Holiday Security Tips: an Online Shopping Checklist

We're here to help you Give Boldly and shop safely online. See how you can protect your holiday cheer from cybercriminals this year. Check out these tips before you checkout at your favorite online stores. Remember these key tips to shop safely online: Don't click on unsolicited emails or links to "deals" that seem to good to be true. Use the latest, updated version of your internet browser. Check to ensure your purchases and transactions are taking place on a secure site. Read more: The 12 Scams of Holidays Past What is the Safest Way to Pay This Holiday Season?
Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats. You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs wa...
Read More