Top Banner
SMB Confident The < 4 > Contents Contents Cover Story Case Study Tech Scoop Authentication Feature ç < 4 > W hen the first attack kit appeared in 1992, a rudimentary affair limited to creating MS-DOS binary and batch viruses, it introduced cybercrime and the cre- ation of mass-mailing worms to the technically less savvy. But launching attacks was still largely the domain of seasoned hackers with extensive programming knowledge, and it would remain so for years. Now, according to Symantec’s Internet Secu- rity Threat Report: Mid-Term Report, the advent of attack toolkits has lowered the bar signifi- cantly for anyone with a basic understanding of networking and computers to produce threats that exploit vulnerabilities. In the last few years, Symantec has been detecting significant growth in the development, sale, and use of highly so- phisticated attack kits in the threat landscape. Much of this growth is the result of the relative simplicity and effectiveness of using attack toolkits, which are now behind the majority of malicious attacks against SMBs and enterprises alike. Zeus, a major toolkit that first appeared in 2007, accounted for more than 90,000 unique malicious code variants as of August 2009 and is likely responsible for infecting millions of com- puters. Advertised and sold in the online underground economy, attack kits such as Zeus are not only becoming more sophisticated and user-friendly, but are playing an increasing role in the evolution of cybercrime into an organized and profitable industry worth millions of dollars. See the full details of the report here. Proliferation of attack toolkits opens cybercrime to all Lowering the Bar Think Tank Symantec Endpoint Protection 12 Unveiled Symantec recently announced new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing small and midsize businesses with advanced protection while improving system performance. The new versions offer advanced features to secure virtual infrastructures and are powered by Insight, Symantec’s award-winning community and cloud-based reputation technology. Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to easy-to-use attack toolkits, such as Zeus, which lower the barrier of entry in cybercrime. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape. Read more here. SMBBEAT
7

Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

Jan 24, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 4 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 4 >

When the first attack kit appeared in

1992, a rudimentary affair limited to

creating MS-DOS binary and batch

viruses, it introduced cybercrime and the cre-

ation of mass-mailing worms to the technically

less savvy. But launching attacks was still largely

the domain of seasoned hackers with extensive

programming knowledge, and it would remain

so for years.

Now, according to Symantec’s Internet Secu-

rity Threat Report: Mid-Term Report, the advent

of attack toolkits has lowered the bar signifi-

cantly for anyone with a basic understanding of

networking and computers to produce threats

that exploit vulnerabilities. In the last few years,

Symantec has been detecting significant growth

in the development, sale, and use of highly so-

phisticated attack kits in the threat landscape.

Much of this growth is the result of the relative simplicity and effectiveness of using attack

toolkits, which are now behind the majority of malicious attacks against SMBs and enterprises

alike. Zeus, a major toolkit that first appeared in 2007, accounted for more than 90,000 unique

malicious code variants as of August 2009 and is likely responsible for infecting millions of com-

puters. Advertised and sold in the online underground economy, attack kits such as Zeus are not

only becoming more sophisticated and user-friendly, but are playing an increasing role in the

evolution of cybercrime into an organized and profitable industry worth millions of dollars.

See the full details of the report here.

Proliferation of attack toolkits opens cybercrime to allLowering the Bar

ThinkTank

Symantec Endpoint Protection 12 Unveiled Symantec recently announced new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing small and midsize businesses with advanced protection while improving system performance. The new versions offer advanced features to secure virtual infrastructures and are powered by Insight, Symantec’s award-winning community and cloud-based reputation technology. Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to easy-to-use attack toolkits, such as Zeus, which lower the barrier of entry in cybercrime. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape. Read more here.

SMBBEAT

Page 2: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 5 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 5 >

Continued on next page *

ThinkTank

Over the recent Valentine’s Day holiday,

Symantec showed just how much data security

is at the heart of small and midsize businesses,

or should be, with results from the 2010

Global SMB Information Protection Survey:

74 percent of SMBs are concerned about losing electronic information

42 percent of SMBs have lost confi-dential or proprietary information in the past

$51,000 is spent, on average, by each SMB every year on computer secu-rity, backup, recovery, archiving, and disaster preparedness

66 percent of SMB’s IT staff time is spent on computer security, backup, recovery, archiving, and disaster preparedness

65 percent of SMBs have lost laptops, smartphones, or iPads in the last year, many of which have no password protection and cannot be wiped remotely

73 percent of SMBs were victims of cyberattacks in the last year, result-ing in downtime, loss of corporate data, and loss of customers’ personal information

Read more on the study here.

For Thy Love of Information SMBs count the ways of effective data security

Symantec Honored by SBA Symantec was recently honored by the U.S. Small Business Administration (SBA) as one of eight recipients of the inaugural Small Business Innovation Research (SBIR) Program Hall of Fame Award. The SBIR Hall of Fame award recognizes companies with a long period of extraordinary success of research, innovation, and commercialization within the 30-year SBIR program. Symantec was the first recipient of a grant via the program in 1982, established at the time by Roland Tibbett. The grant was critical for Gary Hendrix to found Symantec. “We work with small businesses every day as our customers and our partners and they truly are the lifeblood of our economy,” said Symantec’s vice president of channel sales Randy Cochran, who accepted the award for Symantec. “Symantec was started with a grant from the National Science Foundation 29 years ago and today we are 18,500 strong with operations in more than 40 countries. The SBIR program is critical to fostering innovation and keeping America competitive on a global scale. We fully support the program and encourage Congress to permanently fund it. Read more here.

SMBBEATContinued from previous page

Page 3: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 6 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 6 >

SMBBEAT

Norton Survey Reveals High Cell Phone Loss, TheftAt a time when smartphone use has become engrained in everyday life as a primary way to communicate, work, and share, a new survey from Norton reveals that 36 percent of users in the U.S. have fallen victim to cell phone loss or theft. These results make it clear that there is a growing need to protect important and personal information stored on smartphones. To that end, Norton has released Norton Mobile Security 1.5, the only product for Android to seamlessly combine anti-theft features with powerful mobile antimalware, giving users a sense of security in the event their phone is lost or stolen. Frustration was the most dominant feeling users experienced when their mobile phone was lost or stolen, likely because 87 percent could neither remotely lock nor remotely wipe their phone’s memory afterwards, and more than half (54 percent) of all smartphone users did

not password protect their phones. An overwhelming majority of respondents contacted their mobile service provider to resolve the situation as the first step and ultimately reported that it cost an average of $125.30 to resolve. Read more here.

Symantec, Intel Integrate Authentication CredentialsStrong authentication has now become faster, cheaper, and easier for SMBs to manage. Symantec has worked with Intel Corporation to integrate Symantec’s VeriSign Identity Protection (VIP) credential into the Intel Identity Protec-tion Technology (IPT) found in second generation Intel Core processor platforms including Intel Core vPro processors. Used in tandem with a user-name and password, this cre-dential enables strong authen-tication to business, partner, and consumer applications. Intel IPT with VIP strong authentication will be avail-able in March 2011 on select systems that include second

Continued from previous page

ThinkTank

For most of cybercrime’s history, hackers tended to resemble graffiti artists, out for glory and

prestige within their community of fellow hackers. The intent was to create chaos while earning notoriety. For example, hacker David L. Smith’s “Melissa” virus released in 1999 caused an estimated $80 million in damages to infected computers, yet did not drive any criminal revenue to Smith. Likewise, 18-year-old Jeffrey Parson’s “SoBig” worm in 2003 was one of the fastest spreading worms created up to that time, and caused $50 million in damages in the U.S. alone.

But the world of cybercrime is changing, and fast. In the last several years, Symantec has tracked a troubling trend across the Internet. The threat landscape—once dominated by worms and viruses created by irresponsible hackers—is now controlled by a new breed of cybercriminals motivated by fraud and a potential fortune in ill-gotten revenue. According to Symantec’s Cybercrime Exposed report, threats jumped from 140,690 new threats in 2006 to 1,656,227 new threats in 2008, a nearly 12-fold increase.

Typical of the new cybercrimes are socially engineered emails sent by “phishers” intended to steal personal information. According to Symantec, phishing attacks are increasing by as much as 20 percent a month, with most playing upon users’ interests and emotions: buying jerseys from your favorite sports team or donating to a charity results in a stolen credit card number. As the revenue from cybercrime increases, criminals lured by potential gains are becoming more organized and sophisticated. The days of teenage hackers working from their parents’ basement are becoming a thing of the past. Read more on cybercrime here.

The New Breed of HackersCybercriminals motivated by fame replaced by fortune seekers

Continued on next page *

Page 4: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 7 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 7 >

ThinkTank

SMBBEATContinued from previous page

generation Intel Core pro-cessors. By combining VIP with Intel IPT, a new class of strong authentication credential is now available to business and consumer PC users. This new creden-tial form factor provides a highly secure, easy to use, and cost-effective way to implement strong authentication. Because the credential is embedded in the Intel chipset, the need to purchase, replace, or download credentials is now eliminated, allow-ing small businesses to go from “zero to secure” in record time. Read more here.

Symantec Launches Free Trial of SSL Certificates Symantec and Milyoni, the leader in social commerce, recently teamed to offer the enhanced security of Symantec’s VeriSign Secure Sockets Layer (SSL) Certificates to SMBs aim-ing to reach customers via

Facebook and other social net-working outlets. Shop Heat, the Miami Heat’s fan store, is the latest to implement VeriSign SSL security through Milyoni’s Conversational Commerce solution, the first shopping cart that operates entirely within Facebook. By offer-ing a means to securely conduct online transac-tions with Facebook’s 500 million users, Milyoni offers companies an enor-mous opportunity to weave social networking with the ability to discuss and buy merchandise directly on the site. And by offering VeriSign SSL Certificates to merchants who use the Conversational Commerce solution to establish stores on Facebook, Milyoni is enabling companies to display the familiar Veri-Sign Trusted checkmark and seal, the Internet’s number-one trust mark. Read more here.

I could swear that I put last week’s USB backup in here. I don’t understand what happened to it.

Bell America Mortgage, LLCIncreases threat detection 35-fold

with Symantec.cloud

Design InkReduces Microsoft Exchange mail

store by more than 50% with Backup

Exec

Paul’s HaulingReclaims 33 hours of productivity

weekly with Symantec solutions

S&K SalesDaily administration time cut

by one-third with Backup Exec 2010

TDXNet, LLC

Projected savings totals $2.6 million

with Symantec security solutions

SUCCESS in ACTION

Page 5: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 8 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 8 >

OFFERSSymantec Endpoint Protection 12: Join the beta

Try Free: Symantec Endpoint Protection.cloud

Protect More, Store Less, Save More

WORD TO THE WISEState of Spam and Phishing February ReportScammers Seek Support for Serrana Flood Victims

Completely Protecting Small BusinessesMore than 286 million distinct Internet security threats were discovered last year. Symantec responds with latest version of Symantec Endpoint Protection Small Business Edition.

Symantec 2011 SMB Disaster Preparedness SurveyStudy reveals disasters have significant impact on SMBs with the median cost of downtime being $12,500 per day.

Attack Kits Target SMBs, TooReport finds that attack kits are significantly advancing the evolution of cybercrime intoa self-sustaining, profitable business worth millions.

Small Business Endpoint Protection Performance BenchmarkPassMark Software’s perfor-mance test rates Symantec Endpoint Protection 12 as the fittest and fastest.

ThinkTank

WEBCASTS> Protect Your Sensitive Information from the Latest Security Threats

> IT Consultants: Going Deep with Small Businesses

>Next Generation Endpoint Security: Countering Modern Cyber Threats

STREAMING

>Creating Acceptable Use Policies for Next Generation Users

>End to End Cloud Security for Small Businesses

>Simplifying Security for Your Mobile Workforce

VIDEO> PassMark Success: Small Business Protection

Page 6: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 9 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç ç

< 9 >

ThinkTank

Technical White Paper for the

Software Portal in Software

Management Solution 7.1

• This article details how Software

Portal works and provides methods

to assist in solving issues.

Using Client Management

Suite to Deploy Adobe CS5

• This article provides an overview of

how to use Adobe Application

Manager Enterprise Edition with

Symantec Management Platform to

package and distribute Adobe

Creative Suite.

Backup to removable disks

• This article provides helpful tips

for making backups to multiple

removable disks.

Adding Multiple Attachments

in a Workflow/Web Form Project

• This article explains how to add

multiple attachments to a Workflow

or Web Form project, save them to a

file system, record their location in

a database and recall them for viewing.

How to restore Exchange 2010

Database to Recovery Database

using Backup Exec 2010

• This article details the procedure to

restore Exchange 2010 database to

the Recovery Database using

Backup Exec 2010.

The Known Issues feature is now LIVE!

• This article announces new Backup

Exec “Known Issues” feature and is

now live and ready for access.

BUILDING CONNECTIONS

From best practices to troubleshooting, Symantec Connect is your place to find timely hints and get your questions answered. Check out some highlights from recent conversations on Connect.

The Confident SMB is looking for IT professionals to share their expertise on how they’re using Symantec technology to address small and midsize business challenges today and into the future. Submit your thoughts and analysis on lessons learned, tips and tricks, and best practices!

Send in your contributed article submissions to [email protected] for a chance to be featured in the next issue of the Confident SMB. To view the contributed article sub-mission guidelines, click here.

Calling all IT professionals!

KNOWLEDGE SHARING

iTUNES APP Available for FREE at go.symantec.com/ theconfidensmb-itunes

1. In my opinion, we should use the same icon for AIR and the mobilepieces (one for each magazine).

2. We have the challenge of our corporate logo changing to the checkmark. I hate to launch this with the Symantec logo and then relaunch itin a few months (projected August timeframe for the new logo's o cialrelease). Perhaps we should use one without the Symantec logo?

3. With #1 and #2, I think we need to come up with something else thatisn't tied to the Symantec logo and AIR...?

CIO

SYMANTEC CIO

SYMANTEC

SYMANTEC

A

C

A

B (85% K)

CIOCIO

CIOSYMANTEC

CIO

Page 7: Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated

SMBConfidentThe

< 37 >

ContentsContents

Co

ver

Sto

ryC

ase

Stu

dy

Tech

Sco

opA

uthe

ntic

atio

n Fe

atur

e

ç

< 37 >

The Confident SMB Blog Get insights and highlights of new content, and interact with The Confident SMB team. Symantec Facebook Page Readers with Facebook accounts can connect and share ideas with Symantec while also receiving notifi-cation of each new issue. Become a fan today. Twitter Tweeting on everything from the new The Confident SMB articles, research reports, podcasts, webcasts, custom-er successes, and more, the Symantec Publishing Twitter account keeps Symantec customers and partners up to date. Start following the tweets today.

Linkedln Exchange tips and strate-gies with peers by joining The Confident SMB group on LinkedIn.com.

SOCIAL MEDIA

ThinkTank

Find a ResellerFind the perfect partner to help you manage your IT needs

Trialware DownloadsTrial version of Symantec products are available for download

Symantec eLibrary: A Subscription for SuccessOne-year subscription gives you access to hundreds of Symantec training modules

License Renewal CenterGet continued protection for your product today

PodcastsFor people on the go, pod-casts deliver news, product information, and strategies you can use

Customer SuccessSee how other SMBs succeed with the help of Symantec

Hosted ServicesSecure and manage your information using the power of cloud computing

Education ServicesMaximize your IT investment with a skilled, educated workforce

Symantec ConnectA technical community to help your IT team keep your systems up and running

RESOURCESVisit us online at Small Business Solutions and Midsize Business Solutions and take advantage of a world of resources to help you have confidence in your connected world.