Vulnerabilities That Can Harm Your Site

In 2012 Symantec performed more than 1,400 website vulnerability scans each day. More than half the websites scanned were found to have unpatched, potentially exploitable vulnerabilities. Of the vulnerable sites, a quarter were actually infected with malware that could infect visitors and lead to the sites being blacklisted by search engines. These figures show that

The Power to Destroy: How Malware Works

Nearly a quarter of IT managers simply don’t know how secure their website is. However, with the rising number of web-attacks blocked per day, it’s vital for businesses to understand the part their website plays in the distribution of malware to clients, customers and the wider online community.

Vulnerability Assessment

2011’s security breach at Sony’s PlayStation Network is thought to be the largest data security leakage ever and was so damaging its effects are still being felt today – in January 2013 the UK Information Commissioners Office (ICO) fined Sony Computer Entertainment Europe £250,000 ($396,100) following what was described as a ‘serious breach’ of the

Phishing – The latest tactics and potential business impacts

As one of the top cybercrime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years. In fact, there was an average of over 37,000 phishing attacks each month in 2012. This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies,

Internet Security Threat Report 2014

Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products

Protect Against Targeted Attacks With Security Intelligence

Targeted attacks are the new frontier for security professionals and show the increasing sophistication of cyber criminals. They are multilayered attacks that require structured research by cyber criminals about their potential victims, such as finding out their email addresses, job titles and job functions, areas of interest, websites they frequently access, conferences they attend and

Modernizing Data Protection With Backup Appliances

Transformation of the backup infrastructure is the next frontier for IT and storage managers. Backup is an area where architectures are only slowly evolving, and “never touch a running system” is the mantra in many organizations. However, the transformation of the IT infrastructure that is happening in most IT departments today, starting with the introduction

The Evolution and Value of Purpose-Built Backup Appliances

Today, customers are still grappling with subpar backup performance as backups outstrip the allotted backup window time. Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances