SMB Confident The < 4 > Contents Contents Cover Story Case Study Tech Scoop Authentication Feature ç < 4 > W hen the first attack kit appeared in 1992, a rudimentary affair limited to creating MS-DOS binary and batch viruses, it introduced cybercrime and the cre- ation of mass-mailing worms to the technically less savvy. But launching attacks was still largely the domain of seasoned hackers with extensive programming knowledge, and it would remain so for years. Now, according to Symantec’s Internet Secu- rity Threat Report: Mid-Term Report, the advent of attack toolkits has lowered the bar signifi- cantly for anyone with a basic understanding of networking and computers to produce threats that exploit vulnerabilities. In the last few years, Symantec has been detecting significant growth in the development, sale, and use of highly so- phisticated attack kits in the threat landscape. Much of this growth is the result of the relative simplicity and effectiveness of using attack toolkits, which are now behind the majority of malicious attacks against SMBs and enterprises alike. Zeus, a major toolkit that first appeared in 2007, accounted for more than 90,000 unique malicious code variants as of August 2009 and is likely responsible for infecting millions of com- puters. Advertised and sold in the online underground economy, attack kits such as Zeus are not only becoming more sophisticated and user-friendly, but are playing an increasing role in the evolution of cybercrime into an organized and profitable industry worth millions of dollars. See the full details of the report here. Proliferation of attack toolkits opens cybercrime to all Lowering the Bar Think Tank Symantec Endpoint Protection 12 Unveiled Symantec recently announced new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing small and midsize businesses with advanced protection while improving system performance. The new versions offer advanced features to secure virtual infrastructures and are powered by Insight, Symantec’s award-winning community and cloud-based reputation technology. Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to easy-to-use attack toolkits, such as Zeus, which lower the barrier of entry in cybercrime. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape. Read more here. SMBBEAT
7
Embed
Tech Scoopeval.symantec.com/mktginfo/downloads/MarchAprilTCSMB... · 2011-05-18 · Symantec has been detecting significant growth in the development, sale, and use of highly so-phisticated
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
SMBConfidentThe
< 4 >
ContentsContents
Co
ver
Sto
ryC
ase
Stu
dy
Tech
Sco
opA
uthe
ntic
atio
n Fe
atur
e
ç
< 4 >
When the first attack kit appeared in
1992, a rudimentary affair limited to
creating MS-DOS binary and batch
viruses, it introduced cybercrime and the cre-
ation of mass-mailing worms to the technically
less savvy. But launching attacks was still largely
the domain of seasoned hackers with extensive
programming knowledge, and it would remain
so for years.
Now, according to Symantec’s Internet Secu-
rity Threat Report: Mid-Term Report, the advent
of attack toolkits has lowered the bar signifi-
cantly for anyone with a basic understanding of
networking and computers to produce threats
that exploit vulnerabilities. In the last few years,
Symantec has been detecting significant growth
in the development, sale, and use of highly so-
phisticated attack kits in the threat landscape.
Much of this growth is the result of the relative simplicity and effectiveness of using attack
toolkits, which are now behind the majority of malicious attacks against SMBs and enterprises
alike. Zeus, a major toolkit that first appeared in 2007, accounted for more than 90,000 unique
malicious code variants as of August 2009 and is likely responsible for infecting millions of com-
puters. Advertised and sold in the online underground economy, attack kits such as Zeus are not
only becoming more sophisticated and user-friendly, but are playing an increasing role in the
evolution of cybercrime into an organized and profitable industry worth millions of dollars.
See the full details of the report here.
Proliferation of attack toolkits opens cybercrime to allLowering the Bar
ThinkTank
Symantec Endpoint Protection 12 Unveiled Symantec recently announced new versions of Symantec Endpoint Protection and Symantec Endpoint Protection Small Business Edition (currently in beta), providing small and midsize businesses with advanced protection while improving system performance. The new versions offer advanced features to secure virtual infrastructures and are powered by Insight, Symantec’s award-winning community and cloud-based reputation technology. Symantec Endpoint Protection 12 is designed to detect and block sophisticated new threats earlier and more accurately than any other security product. Last year, attackers unleashed more than 286 million distinct malicious programs, an average of more than nine new threats every second of every day. According to Symantec’s Attack Toolkits and Malicious Websites Report, at least 61 percent of threat activity can be attributed to easy-to-use attack toolkits, such as Zeus, which lower the barrier of entry in cybercrime. Symantec Endpoint Protection 12 leverages Insight to provide unmatched protection against this new threat landscape. Read more here.
74 percent of SMBs are concerned about losing electronic information
42 percent of SMBs have lost confi-dential or proprietary information in the past
$51,000 is spent, on average, by each SMB every year on computer secu-rity, backup, recovery, archiving, and disaster preparedness
66 percent of SMB’s IT staff time is spent on computer security, backup, recovery, archiving, and disaster preparedness
65 percent of SMBs have lost laptops, smartphones, or iPads in the last year, many of which have no password protection and cannot be wiped remotely
73 percent of SMBs were victims of cyberattacks in the last year, result-ing in downtime, loss of corporate data, and loss of customers’ personal information
Read more on the study here.
For Thy Love of Information SMBs count the ways of effective data security
Symantec Honored by SBA Symantec was recently honored by the U.S. Small Business Administration (SBA) as one of eight recipients of the inaugural Small Business Innovation Research (SBIR) Program Hall of Fame Award. The SBIR Hall of Fame award recognizes companies with a long period of extraordinary success of research, innovation, and commercialization within the 30-year SBIR program. Symantec was the first recipient of a grant via the program in 1982, established at the time by Roland Tibbett. The grant was critical for Gary Hendrix to found Symantec. “We work with small businesses every day as our customers and our partners and they truly are the lifeblood of our economy,” said Symantec’s vice president of channel sales Randy Cochran, who accepted the award for Symantec. “Symantec was started with a grant from the National Science Foundation 29 years ago and today we are 18,500 strong with operations in more than 40 countries. The SBIR program is critical to fostering innovation and keeping America competitive on a global scale. We fully support the program and encourage Congress to permanently fund it. Read more here.
Norton Survey Reveals High Cell Phone Loss, TheftAt a time when smartphone use has become engrained in everyday life as a primary way to communicate, work, and share, a new survey from Norton reveals that 36 percent of users in the U.S. have fallen victim to cell phone loss or theft. These results make it clear that there is a growing need to protect important and personal information stored on smartphones. To that end, Norton has released Norton Mobile Security 1.5, the only product for Android to seamlessly combine anti-theft features with powerful mobile antimalware, giving users a sense of security in the event their phone is lost or stolen. Frustration was the most dominant feeling users experienced when their mobile phone was lost or stolen, likely because 87 percent could neither remotely lock nor remotely wipe their phone’s memory afterwards, and more than half (54 percent) of all smartphone users did
not password protect their phones. An overwhelming majority of respondents contacted their mobile service provider to resolve the situation as the first step and ultimately reported that it cost an average of $125.30 to resolve. Read more here.
Symantec, Intel Integrate Authentication CredentialsStrong authentication has now become faster, cheaper, and easier for SMBs to manage. Symantec has worked with Intel Corporation to integrate Symantec’s VeriSign Identity Protection (VIP) credential into the Intel Identity Protec-tion Technology (IPT) found in second generation Intel Core processor platforms including Intel Core vPro processors. Used in tandem with a user-name and password, this cre-dential enables strong authen-tication to business, partner, and consumer applications. Intel IPT with VIP strong authentication will be avail-able in March 2011 on select systems that include second
Continued from previous page
ThinkTank
For most of cybercrime’s history, hackers tended to resemble graffiti artists, out for glory and
prestige within their community of fellow hackers. The intent was to create chaos while earning notoriety. For example, hacker David L. Smith’s “Melissa” virus released in 1999 caused an estimated $80 million in damages to infected computers, yet did not drive any criminal revenue to Smith. Likewise, 18-year-old Jeffrey Parson’s “SoBig” worm in 2003 was one of the fastest spreading worms created up to that time, and caused $50 million in damages in the U.S. alone.
But the world of cybercrime is changing, and fast. In the last several years, Symantec has tracked a troubling trend across the Internet. The threat landscape—once dominated by worms and viruses created by irresponsible hackers—is now controlled by a new breed of cybercriminals motivated by fraud and a potential fortune in ill-gotten revenue. According to Symantec’s Cybercrime Exposed report, threats jumped from 140,690 new threats in 2006 to 1,656,227 new threats in 2008, a nearly 12-fold increase.
Typical of the new cybercrimes are socially engineered emails sent by “phishers” intended to steal personal information. According to Symantec, phishing attacks are increasing by as much as 20 percent a month, with most playing upon users’ interests and emotions: buying jerseys from your favorite sports team or donating to a charity results in a stolen credit card number. As the revenue from cybercrime increases, criminals lured by potential gains are becoming more organized and sophisticated. The days of teenage hackers working from their parents’ basement are becoming a thing of the past. Read more on cybercrime here.
The New Breed of HackersCybercriminals motivated by fame replaced by fortune seekers
generation Intel Core pro-cessors. By combining VIP with Intel IPT, a new class of strong authentication credential is now available to business and consumer PC users. This new creden-tial form factor provides a highly secure, easy to use, and cost-effective way to implement strong authentication. Because the credential is embedded in the Intel chipset, the need to purchase, replace, or download credentials is now eliminated, allow-ing small businesses to go from “zero to secure” in record time. Read more here.
Symantec Launches Free Trial of SSL Certificates Symantec and Milyoni, the leader in social commerce, recently teamed to offer the enhanced security of Symantec’s VeriSign Secure Sockets Layer (SSL) Certificates to SMBs aim-ing to reach customers via
Facebook and other social net-working outlets. Shop Heat, the Miami Heat’s fan store, is the latest to implement VeriSign SSL security through Milyoni’s Conversational Commerce solution, the first shopping cart that operates entirely within Facebook. By offer-ing a means to securely conduct online transac-tions with Facebook’s 500 million users, Milyoni offers companies an enor-mous opportunity to weave social networking with the ability to discuss and buy merchandise directly on the site. And by offering VeriSign SSL Certificates to merchants who use the Conversational Commerce solution to establish stores on Facebook, Milyoni is enabling companies to display the familiar Veri-Sign Trusted checkmark and seal, the Internet’s number-one trust mark. Read more here.
I could swear that I put last week’s USB backup in here. I don’t understand what happened to it.
Bell America Mortgage, LLCIncreases threat detection 35-fold
OFFERSSymantec Endpoint Protection 12: Join the beta
Try Free: Symantec Endpoint Protection.cloud
Protect More, Store Less, Save More
WORD TO THE WISEState of Spam and Phishing February ReportScammers Seek Support for Serrana Flood Victims
Completely Protecting Small BusinessesMore than 286 million distinct Internet security threats were discovered last year. Symantec responds with latest version of Symantec Endpoint Protection Small Business Edition.
Symantec 2011 SMB Disaster Preparedness SurveyStudy reveals disasters have significant impact on SMBs with the median cost of downtime being $12,500 per day.
Attack Kits Target SMBs, TooReport finds that attack kits are significantly advancing the evolution of cybercrime intoa self-sustaining, profitable business worth millions.
Small Business Endpoint Protection Performance BenchmarkPassMark Software’s perfor-mance test rates Symantec Endpoint Protection 12 as the fittest and fastest.
ThinkTank
WEBCASTS> Protect Your Sensitive Information from the Latest Security Threats
> IT Consultants: Going Deep with Small Businesses
>Next Generation Endpoint Security: Countering Modern Cyber Threats
STREAMING
>Creating Acceptable Use Policies for Next Generation Users
>End to End Cloud Security for Small Businesses
>Simplifying Security for Your Mobile Workforce
VIDEO> PassMark Success: Small Business Protection
From best practices to troubleshooting, Symantec Connect is your place to find timely hints and get your questions answered. Check out some highlights from recent conversations on Connect.
The Confident SMB is looking for IT professionals to share their expertise on how they’re using Symantec technology to address small and midsize business challenges today and into the future. Submit your thoughts and analysis on lessons learned, tips and tricks, and best practices!
Send in your contributed article submissions to [email protected] for a chance to be featured in the next issue of the Confident SMB. To view the contributed article sub-mission guidelines, click here.
Calling all IT professionals!
KNOWLEDGE SHARING
iTUNES APP Available for FREE at go.symantec.com/ theconfidensmb-itunes
1. In my opinion, we should use the same icon for AIR and the mobilepieces (one for each magazine).
2. We have the challenge of our corporate logo changing to the checkmark. I hate to launch this with the Symantec logo and then relaunch itin a few months (projected August timeframe for the new logo's o cialrelease). Perhaps we should use one without the Symantec logo?
3. With #1 and #2, I think we need to come up with something else thatisn't tied to the Symantec logo and AIR...?
The Confident SMB Blog Get insights and highlights of new content, and interact with The Confident SMB team. Symantec Facebook Page Readers with Facebook accounts can connect and share ideas with Symantec while also receiving notifi-cation of each new issue. Become a fan today. Twitter Tweeting on everything from the new The Confident SMB articles, research reports, podcasts, webcasts, custom-er successes, and more, the Symantec Publishing Twitter account keeps Symantec customers and partners up to date. Start following the tweets today.
Linkedln Exchange tips and strate-gies with peers by joining The Confident SMB group on LinkedIn.com.
SOCIAL MEDIA
ThinkTank
Find a ResellerFind the perfect partner to help you manage your IT needs
Trialware DownloadsTrial version of Symantec products are available for download
Symantec eLibrary: A Subscription for SuccessOne-year subscription gives you access to hundreds of Symantec training modules
License Renewal CenterGet continued protection for your product today
PodcastsFor people on the go, pod-casts deliver news, product information, and strategies you can use
Customer SuccessSee how other SMBs succeed with the help of Symantec
Hosted ServicesSecure and manage your information using the power of cloud computing
Education ServicesMaximize your IT investment with a skilled, educated workforce
Symantec ConnectA technical community to help your IT team keep your systems up and running
RESOURCESVisit us online at Small Business Solutions and Midsize Business Solutions and take advantage of a world of resources to help you have confidence in your connected world.