Top Banner
Confidence in a connected world. SMB Confident The Contents Cover Story Case Study ç Two Is Better Than One Doing More with Less ç < 4 > T he Internet Crime Complaint Center, established in 2000 as a partnership between the FBI and the National White Collar Crime Center, recently issued a report on the level of Internet crime during 2009. Reported losses from online fraud more than doubled, from $265 million in 2008 to nearly $560 million in 2009. In 2009, the IC3 received about 336,655 complaints, a 22.3 percent increase from 2008. Ironically, among the largest sources of complaints (16.6 percent) were email scams that fraudulently used the FBI’s name to gain information from the recipient. The median dollar loss was $575, while the highest median losses were associated with investment fraud ($3,200), overpayment fraud ($2,500), and advanced-fee fraud ($1,500). Since its inception, IC3 has received complaints across a wide spectrum of cybercrime, including online fraud, intellectual property rights, computer intrusions, economic espionage, child pornography, international money laundering, identity theft, and a growing list of additional criminal and civil matters. 0 $100 $200 $300 $400 $500 $600 2001 2002 2003 2004 2005 2006 2007 2008 2008 $17.8 $54 $125.6 $68.1 $183.1 $198.4 $239.1 $264..6 $559.7 Loss from online scams more than doubled in 2009 Masquerading as the FBI Think Tank Source: 2009 Internet Crime Report Protecting the 2010 Census Beware of email scams trying to hijack the 2010 census W ith the 2010 census underway, cyber- crooks have been disguising themselves as emissaries of the United States Census Bureau to steal personal information. But pro- tecting employees against such fraud is not that difficult. No part of the census form is currently available to be filled out online. So, be wary of online communications—including emails and social networking messages—purporting to be from the Census Bureau, especially any that ask you to click on a link or URL, open an attachment, or respond with personal information, because these could very likely be scams. Even clicking on a link to see if it takes you to a legitimate site can be dangerous, triggering a drive-by download attack. Knowing what types of questions will be asked will also help distinguish between legitimate commu- nications regarding the census and attempts by criminals to steal sensitive information. Because of the nature of the census, people are already willing to share personal information. This makes it especially appealing to target PC users. Not only that, but with the 2010 Census such a major event, scammers and spammers will use this prime opportunity to fool users. To learn more, click here. Yearly Dollar Loss (in millions) of Referred Complaints
7

The ThinkTank SMB

Feb 04, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 4 >

The Internet Crime Complaint Center, established in 2000 as a partnership between the FBI and the National White Collar Crime Center, recently issued

a report on the level of Internet crime during 2009. Reported losses from online fraud more than doubled, from $265 million in 2008 to nearly $560 million in 2009. In 2009, the IC3 received about 336,655 complaints, a 22.3 percent increase from 2008.

Ironically, among the largest sources of complaints (16.6 percent) were email scams that fraudulently used the FBI’s name to gain information from the recipient. The median dollar loss was $575, while the highest median losses were associated with investment fraud ($3,200), overpayment fraud ($2,500), and advanced-fee fraud ($1,500).

Since its inception, IC3 has received complaints across a wide spectrum of cybercrime, including online fraud, intellectual property rights, computer intrusions, economic espionage, child pornography, international money laundering, identity theft, and a growing list of additional criminal and civil matters.

0

$100

$200

$300

$400

$500

$600

2001 2002 2003 2004 2005 2006 2007 20082008

$17.8$54

$125.6

$68.1

$183.1$198.4

$239.1$264..6

$559.7

Loss from online scams more than doubled in 2009

Masquerading as the FBI

ThinkTank

Source: 2009 Internet Crime Report

Protecting the 2010 CensusBeware of email scams trying to hijack the 2010 census

With the 2010 census underway, cyber-crooks have been disguising themselves as emissaries of the United States Census

Bureau to steal personal information. But pro-tecting employees against such fraud is not that difficult. No part of the census form is currently available to be filled out online. So, be wary of online communications—including emails and social networking messages—purporting to be from the Census Bureau, especially any that ask you to click on a link or URL, open an attachment, or respond with personal information, because these could very likely be scams. Even clicking on a

link to see if it takes you to a legitimate site can be dangerous, triggering a drive-by download attack. Knowing what types of questions will be asked will also help distinguish between legitimate commu-nications regarding the census and attempts by criminals to steal sensitive information.

Because of the nature of the census, people are already willing to share personal information. This makes it especially appealing to target PC users. Not only that, but with the 2010 Census such a major event, scammers and spammers will use this prime opportunity to fool users.

To learn more, click here.

Yearly Dollar Loss (in millions) of Referred Complaints

Page 2: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 5 >

Zeus Trojan Hits SMBs HardestZeus Trojan, the global hacking mal-ware that was first identified in 2007, appears to be especially hard on SMBs. According to a report by RSA FraudAction, as many as 88 percent of FORTUNE 500 companies have been affected by the Zeus Trojan vi-rus, but SMBs have a higher percent-age of infected employees. While this implies that smaller companies are less adept at systems and data secu-rity than large corporations, the study revealed that home computers with access to corporate networks are at especially high risk. Estimated to af-fect 3.6 million PCs in the U.S. alone, the Trojan uses keystroke logging to steal banking information, mostly at-tacking PCs with Windows XP, though Vista and Windows 7 variations are available as well. To read more about this issue, click here.

Symantec CEO Salem Talks Integration and Services ShiftSymantec’s product integration strategy, as well as the company’s decision to transfer large parts of its consulting services to its partners

Continued on next page *

ThinkTank

SMBBEAT

A recent report by Forrester, The State Of SMB IT Security And Emerging Trends: 2009 To 2010, reveals that security spending for SMBs has been faring relatively well through the economic downturn and budgets ap-

pear to be strengthening, most notably for new product purchases. An interest-ing characteristic is that SMBs of all sizes prefer client security suites over point products by 6 to 10 percentage points.

The survey shows that although data security is as much a priority for SMBs as it is for enterprises, SMBs are not as aggressive at deploying desktop data

protection tech-nologies. Only 20 percent of SMBs have imple-mented full disk encryption, and another nine per-cent stated that they planned to implement this in the next 12 months. Similarly, only 15 percent of SMBs

have implemented data loss prevention on the desktop, although another eight percent plan to do so within a year.

For the complete report click here.

Prioritizing Security SMBs seek the superior protection offered by managed security services to address growing concerns over network and data

SMB IT Security Trends across North America and Europe37% of SMBs expect spending on new secu-rity technology to significantly increase (greater than a 5% increase in budget) while only 6% expect it to significantly decrease

56% of SMBs look to their VARs or systems integrators to purchase security technologies or hosted services

51% of SMBs purchase directly from security vendors

86% of SMBs cite quality of data security as a critical or top priority

75% of SMBs reveal that other organizational priorities take precedence over security initia-tives

40% of SMBs are more concerned about smartphones than any other technology, higher even than concerns over cloud computing (32%) or data center virtualization (30%)

66% of organizations cited quality of protec-tion as an important factor in their decision to adopt managed security; 48% cite cost reduc-tion as a factor

Page 3: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 6 >

SMBBEAT

were the focus of an interview with CEO Enrique Salem at the Vision 2010 Conference in Las Vegas in April. Interviewed by Channelweb.com, Salem recapped his first year at the helm of Symantec, citing “huge progress” in the increased quality and integration of the com-pany’s products. “I’m really pleased with the improvements we’ve seen in what we call the net promoter scores,” Salem told Channelweb.com security editor, Stefanie Hoff-man. “Our portfolio has gotten to a point where people understand…instead of having to worry about selling backup and archiving and having them be separate, it’s now integrated,” To read the full inter-view, click here.

Changing Lives with Kiva.orgA mere $400 may not seem near enough for starting a business, but for the more than 339,000 entrepreneurs in 196 countries around the world who have re-ceived micro-loans through Kiva.org, that seemingly meager amount has changed lives. Founded in 2005

in San Francisco, Kiva Microfunds allows people to loan money via the Internet to small business entre-preneurs in developing countries, as well as the U.S. The funds are sent to microfinance institutions in those countries, which administer the loans. One such company is Aqroinvest Credit Union in Azer-baijan that recently lent $1,125 to Ruslan Bagirov to expand his produce shop. Total loans made through Kiva stand at more than $133,136,000—82.22 percent to women entrepreneurs—with an average loan size of $393. And while Kiva lenders receive 0 percent on their loan, repayment rates are currently 98.57 percent. For more information, click here.

Norton Releases New ProductsThe 2011 beta versions of Norton AntiVirus and Norton Internet Se-curity were released in late April, with downloads available via the Norton beta website. The compa-ny also introduced a beta security application for Facebook, as well as two standalone security tools

Continued from previous page

ThinkTank

Cybercrime, which affects one in five online shoppers and in 2009 cost Americans $560 million in online fraud, may hit closer to home

than many realize. Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to identify the nation’s top 10 cities most vulnerable to cybercrime. The rankings were determined through a combination of Symantec Security Response’s data on

cyberattacks and potential malware infections, as well as third-party data about online behavior, such as accessing wifi hotspots and online shopping.

Of the 50 U.S. cities examined, Seattle topped the list as the riskiest online city while Detroit came in as the least risky. In-terestingly, many of the riskiest cities are also considered among the most tech-savvy cities in the nation, with a far greater degree

of online activity. But being tech-savvy doesn’t always guarantee safe online behavior. The Motor City’s residents were less likely to participate in risky online behavior compared to other cities in the study, but it also ranked low in access to the Internet, expenditures on computer equipment, and wireless Internet access.

To learn more, click here.

Risky Cyber CitiesWhich cities are most vulnerable to cybercrime?

The Norton Top 10 Riskiest Online Cities1 Seattle 2 Boston3 Washington, D.C. 4 San Francisco 5 Raleigh, N.C. 6 Atlanta7 Minneapolis 8 Denver9 Austin, Texas Portland, Ore.10

Continued on next page *

Page 4: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 7 >

ThinkTank

SMBBEATContinued from previous page

to combat the rise of fake antivi-rus programs and other malware. Developed to maintain or improve installation times, memory us-age, and scan times, the betas will come with System Insight 2.0, which sends alerts to users when an application is substan-tially affecting system resources. Users will also have Download Insight 2.0, which will increase the breadth of protection by covering nearly every download no matter the client, protecting users from harmful downloads. Norton 2011 reports on the “trustworthiness” of a system’s files to show how a user’s download activity rates in riskiness, comparing it against data from Norton Community Watch’s 53 million members. For more information, click here.

Helping Low Income Women Entrepreneurs in Silicon ValleyOn April 6, Symantec participated with volunteers from area compa-nies in a Women’s Initiative for Self Employment Connect event hosted by NetApp. More than 100 low income women graduates of Wom-en’s Initiative programs, all starting

their own businesses in Silicon Val-ley, networked with the volunteers. The evening began with a panel discussion on effectively accessing new markets and increasing sales, followed by small group discussions among women entrepreneurs and volunteers to answer questions and offer advice on the issues women face in starting their businesses.

Women’s Initiative is the na-tion’s largest microenterprise training and financial services organization providing low-income women with training, funding, and ongoing support to start and grow their own businesses. Within a year of graduation, clients’ per-sonal income jumps an average of 75 percent. Seventy percent of graduates stay in business and have consistent sales five years later. In 2008 alone, 2.25 new jobs were created every day by gradu-ates. Symantec is excited to have the opportunity to demonstrate its commitment to increasing women’s participation in business in our community by supporting Women’s Initiative. For more in-formation on Symantec employee initiatives, click here.

Axon Computer Systems

Windows 7 booted up seam-

lessly

Bertelkamp Automation

Spam blocked at email gateway

J.A. Kennedy Real Estate

Staff hours reclaimed improving

productivity

Rutherford & Chekene

IT risk minimized for 100%

payback

SUCCESS in ACTION

Yes, we have virtualization. We have a policy that allows employees to work virtually from any location in the world.

Page 5: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 8 >

OFFERSNorton Internet Security and Antivirus2011 Betas Now Available

Symantec Protection Suite Small Business EditionSave 40% on security and backup solutions

Symantec Endpoint Protection Small Business EditionSave 22% on enterprise-level endpoint protection

WORD TO THE WISEBBB: Data Security Made Simple

Symantec Internet Security Threat Report XV

Addressing the Root Cause of Inefficiency Data Protection

A Guide to Selecting Your Hosted Security Provider

How to Guarantee Security, Speed and Confidence in Email

How to Ensure 360 Degree Border Protection

REALITY CHECK TECH BRIEFS Tips on how to Avoid Security Threats

How Free Antivirus Software Can End Up Costing You

What is a Cybermule and how do you avoid it

ThinkTank

STREAMINGWATCH: Intel vPro Technology: A Well-Managed Client is a Secure Client This video demonstrates how a virus can be cleaned outside the client operating system using Symantec Client Man-agement Suite, Intel vPro Technology, and Remote Drive Share ISO.

s WATCH: Meeting the Challenges of Today’s Targeted Attacks Symantec’s security intelligence provides a unique vantage point, offering unparalleled insight and understanding into what’s hap-pening globally in the world of IT security.

WATCH: Is Social Networking Foiling Your Security Practice? Learn how the latest developments in Symantec’s Data Loss Prevention solution tackles social networking and helps you achieve measur-able risk reduction.

s

Page 6: The ThinkTank SMB

çç

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 9 >

Feature Highlights:How do Symantec small business solutions stack up?Did you know Symantec has products specifically designed for small business that focus on ease of use and ease of management?

Get answers with Symantec Endpoint Protection Small Business Edition FAQsWhat features are available in 12.0 and what is the fastest migration path.

Best practices for integrating PCAnywhere into NS6 and Helpdesk 6Using PCAnywhere, integrate NS6 so that you can provide a workable remote control solution to your Helpdesk and NS 6 user.

Free training modules for Backup Exec 2010Get free training modules on Backup Exec 2010—from archiving to migrating Enterprise Vault data.

Save time and storage costs with Backup Exec 2010 What is deduplication and how does it work?

Make your life easier with automatic asset expiration emailsAsset Management Suite, version 7 comes with three pre-defined automation policies.

Learn about managing your Symantec Endpoint Protection serversForum discusses how to manage multiple servers.

The Confident SMB is looking for IT professionals to share their expertise on how they’re using Symantec technology to address small and midsize business chal-lenges today and into the fu-ture. Submit your thoughts and analysis on lessons learned, tips and tricks, and best practices!

Send in your contributed article submissions to

[email protected] for a chance to be featured in the next issue of The Confident SMB. To view the contributed article submission guidelines, click here.

Calling all IT professionals!KNOWLEDGE SHARING

BUILDING CONNECTIONS

Symantec Connect is your peer-to-peer technical community of more than 180,000 registered users to ask questions, get answers, and access articles, videos, and blogs to learn about

upcoming product releases, tips on best practices, and more. It’s your perfect first line of support.

ThinkTank

Page 7: The ThinkTank SMB

Confidence in a connected world.

SMBConfidentThe

Contents

Co

ver

Sto

ryC

ase

Stu

dy

ç

Two

Is B

ette

r Th

an O

neD

oing

Mor

e w

ith

Less

ç

< 10 >

The Confident SMB Blog Get insights and highlights of new content, and interact with The Confident SMB team. Symantec Facebook Page Readers with Facebook accounts can connect and share ideas with Symantec while also receiving notifi-cation of each new issue. Become a fan today. Twitter Tweeting on everything from the new The Confident SMB articles, research reports, podcasts, webcasts, custom-er successes, and more, the Symantec Publishing Twitter account keeps Symantec customers and partners up to date. Start following the tweets today.

Linkedln Exchange tips and strate-gies with peers by joining The Confident SMB group on LinkedIn.com.

SOCIAL MEDIA

ThinkTank

EVENTSMicrosoft Tech·Ed 2010 June 7-10, 2010, New Orleans, LA

eBay Developers Conference June 8-10, 2010, San Jose, CA

Social Security Administration Small Business Procurement Conference June 10, 2010, Baltimore, MD

How to Sell June 11, 2010, Seattle, WA

Click Here for more event information.

Find a ResellerFind the perfect partner to help you manage your IT needs

Trialware DownloadsTrial version of Symantec products are available for download

Symantec eLibrary: A Subscription for SuccessOne-year subscription gives you access to hundreds of Symantec training modules

Chat with a Sales Specialist NowSecurity made simple. Chat directly with a specialist now

License Renewal CenterGet continued protection for your product today

PodcastsFor people on the go, pod-casts deliver news, product information, and strategies you can use

Customer SuccessSee how other SMBs succeed with the help of Symantec

Hosted ServicesSecure and manage your information using the power of cloud computing

Education ServicesMaximize your IT investment with a skilled, educated workforce

Symantec ConnectA technical community to help your IT team keep your systems up and running

RESOURCESVisit us online at Small Business Solutions and Midsize Business Solutions and take advantage of a world of resources to help you have confidence in your connected world.

Talk Back to SymantecDo you recommend Symantec? Share your thoughts.