• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Kudos7 Stats

What's The REAL Cost of 'Free'?

Consumers often shun software with even modest price tags in favor of the next tempting giveaway. But stop and think for a second and it’s pretty obvious these free downloads can’t really cost nothing, or the skilled people who make them wouldn’t be able to earn a living. No, free rarely means free, and you should always be wary of downloading more than you expected. Advertising The acceptable way to monetise free software is to use advertising, and whether you’re okay with that will largely depend on how much you want that new app without paying for it. As the saying goes, “if you’re no...
Read More
Kudos0

BYOD vs. CYOD: What's The Best Fit For Your Business?

The last few years have been all about BYOD – or bring your own device – an IT revolution that freed employees from the shackles of dated or unsuitable hardware in favor of, well, whatever they wanted to use. The benefits are obvious: most employees have their own computers at home and know how to use them, so they can spend more time getting down to business and less time trying to work out why this application doesn’t have that feature. But there are big drawbacks to BYOD as well, and most of them concern security. First there’s the fact that company data is leaving the premises every e...
Read More
Kudos0

Four Things You Should Know About Securing Your Small Business

Small Businesses (SBs) often experience a greater risk from hackers, malware and other security threats. You’ve read the headlines: “Data breach”, “Small vendor used in big attack!” Small Businesses are under increasing attacks from cyber criminals. They are used frequently as a stepping stone to a bigger target such as the big enterprises they conduct business with. In fact, targeted attacks on SBs now account for 30% of all targeted attacks. While still less than those targeted at enterprises, the numbers are growing and other attacks forms are increasing. For example, one in five SBs wa...
Read More
Kudos0

Top 10 "Riskiest" Websites

We all know that the Internet can house all kinds of cyber scams and exploits, but did you know that certain kinds of websites are statistically more likely to host malware than others? You might think avoiding the obviously dodgy corners of the Internet is enough, but in fact approximately 67 percent of websites used to distribute malware are legitimate but compromised sites. You could be visiting them every day. Software is constantly changing, and it takes time and resources to keep a website running on the latest, fully patched software. According to Symantec’s security expert, Kevin ...
Read More
Kudos0

How Can Small Businesses Develop Trust with Customers?

In a small business, your top priority when dealing with customers is trust. Recent high-profile security breaches have eroded consumer confidence, and it’s more important than ever to reassure your customers that they’re safe shopping with you. According to Symantec’s Sr. Director of Product Management, Robert Hoblit, the vast majority of visitors to any shopping site will arrive through web search or advertising, and first impressions are vital. “Around 80% of the customers that land on your website are actually first-time buyers,” he says. “They’ve never seen you before, they’ve never ...
Read More
Kudos0

Quick Tip Guide to Kids' Social and Mobile Privacy

You can’t always keep track of what your children are doing online. For the most part it will be harmless fun, but there’s always the danger that they could stumble into areas they shouldn’t without realizing. Unfortunately, those areas can be the most innocent-seeming ones, such as social networking or mobile apps. You can have the usual parent-child conversations about not chatting to strangers and not revealing too much about themselves, but sometimes the apps take matters into their own hands and give away more than they should. Check out these quick steps you can take to make socia...
Read More
Kudos0

Smart Tips For Smart TV Watching With Dad

It’s Father’s Day once more on June 15th, but this isn’t any old Father’s Day – this one might as well have every dad’s birthday and Christmas Day rolled in as well. Yes, Father’s Day in 2014 falls right at the start of the World Cup in Brazil and on the final day of the US Open golf championship, which makes it all the more likely that dad will be settling down in his armchair to enjoy that new Smart TV he’s had his eye on. But as with anything that connects to the Internet, it pays to be aware of the security issues, and Smart TVs are no different. Only this week the news has been full ...
Read More
Kudos0

In Defense of Devices: Cyber Security Concerns Spread Beyond Your Phone

We’re always hearing about the connected future, an “Internet of Things” (IoT) where our smartphones and tablets are joined online by ever more devices: cameras, TVs, microwaves and fridges, even baby monitors. It sounds great, but every one of those internet-connected devices is another security concern, as Symantec’s 2014 Internet Security Threat Report demonstrates only too clearly. As the report states, last year saw high-profile hacks of baby monitors, security cameras and even home routers by cybercriminals. Meanwhile, security researchers dug around in the software of other devices...
Read More
Kudos1 Stats

Securing Your Small Business Social Media Plan

Today's social media is a crucial tool for business,  Companies that use Twitter, Facebook and other tools in an organised and efficient manner can achieve incredible engagement for relatively little cost, and (with a healthy dose of good fortune) a strong social media campaign can take off around the world and do more for brand recognition than traditional advertising. The key is finding the right balance between informal spontaneity and well-planned company output, and it’s a balance a huge number of businesses are finding hard to get right. Engaging with customers and listening to cons...
Read More
Kudos3 Stats

Symantec Security Detects Dragonfly's Energy Sector-Targeting Cyber Schemes

New research from Symantec uncovering a cyber-espionage campaign that has affected 1,018 unique organizations across 84 different countries has demonstrated the impact of sophisticated phishing attacks and watering hole techniques. The attacker group, dubbed “Dragonfly” by Symantec security experts (other vendors have called them, "Energetic Bear"), launched a campaign against a range of targets, predominantly in the European and American energy sector, over a number of months. Dragonfly used multiple attack methods to install malware onto systems, extracting passwords and documents among...
Read More
Kudos0

Lessons Learned from World Cup Wi-Fi Security Gaffe

Fans around the globe have all eyes on epic soccer matchups cheering for wins and grimacing at errors. One error off the field has also been receiving attention – the World Cup Security Center’s Wi-Fi password reveal. While Symantec has already identified several scams surrounding this international football event targeting consumers on social networks, the incident serves as a reminder that not only awareness of risks and scams online but also proactive security habits are key to protecting your information from hacking or data theft.     Follow these secure Wi-Fi ha...
Read More
Kudos1 Stats

Introducing Boldly Go Wishes

Norton is dedicated to empowering you to Go Boldly, Not Blindly, in every aspect of your life. We want you to take on all the world has to offer. That’s why over the next 5 weeks, we’re celebrating the ones with tremendous goals and the ones who never stop seeking more. The ones who Boldly Go. Here’s how it works, 3 simple steps to enter to win: Follow the Twitter account @NortonOnline Send a Tweet to @Norto...
Read More
Kudos0

Is Norton Getting Out Of The Cloud Business?

Claire Dean, Sr. Director of Global Marketing for Norton Zone, took a moment to address customer questions and concerns regarding the recent decision to remove Norton Zone from Norton's product line-up. Last week we announced the discontinuation of one of our cloud services called Norton Zone. I’ve been working on the Zone project for my entire four years at Symantec and when I told my friends that we made the decision to discontinue it, many had the same reaction: What? Norton is getting out of the cloud? My answer? Absolutely not. Zone is only one cloud service, among many, that Syman...
Read More
Kudos0

3 Hot Mobile Security Tips For Summer Travel

Summer’s finally here, so whether you intend to take a picnic to the park, play with the children in the garden or jet off to somewhere even sunnier, some simple precautions will keep you and your devices safe this summer. Watch your devices First up, physical security. With more outdoor activity it’s natural that it won’t only be your smartphone that travels with you. Parks these days are full of tablets and even lightweight laptops, to go with the many Kindles and Bluetooth speakers, so it pays to be aware of just how valuable your possessions are. Don’t leave them lying in plain sight...
Read More
Kudos0

Will Amazon’s Fire Phone "Burn" Users?

Symantec security expert, Candid Wueest, investigates the security implications of Amazon's new Fire Phone. For the original article, and to catch the latest security intelligence information, check out Symantec's Security Response blog: http://www.symantec.com/connect/blogs/will-amazon-s-fire-phone-burn-users     Everyone has heard stories about smartphones with malfunctioning battery packs bursting into flames, but the new Amazon Fire Phone, despite its name, could pose a different kind of danger. Amazon’s recently announced device is due to be released in July and may present some pote...
Read More