Escolar Documentos
Profissional Documentos
Cultura Documentos
Good for security, good for business Symantec Endpoint Protection Small Business Edition 2013
Content At a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Small businesses under attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Attractive targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Know your enemy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Small businesses struggle with security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Symantec Endpoint 2013 solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The choice is yours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Good for security, good for business Symantec Endpoint Protection Small Business Edition 2013 At a glance
Cyber threats continue to increase. Criminals are getting smarter, but when it comes to small businesses they are getting an easy ride. Symantec's 2012 National Small Business Study found that 83% of small businesses have no formal cyber-security plan. This white paper addresses the two biggest hurdles that small businesses face when it comes to protecting themselves online: understanding the threat and finding a single, flexible product that can protect a range of rapidly evolving small business cultures. According to the 2012 Symantec Small Business Study, almost half of small and medium-size businesses (SMBs) believe that a data breach would remain an isolated incident with minimal business impact. Evidence suggests otherwise. In fact, the average cost to a small business of a serious security breach in 2011 was 15,000-30,000. According to the Study, "one in twenty of the worst security breaches led to business disruption for more than a week, with some continuing for a month."
2 1
Attractive targets
There are a number of reasons cyber criminals want to attack your small business. Firstly, by infiltrating the network or emails of a smaller firm, they can gain access to larger companies higher up the supply chain. It's often easier to attack a business indirectly through a smaller supplier than launch a direct assault. Secondly, your business is an attractive source of revenue in itself. Cyber criminals target small businesses because they have more money than individuals, but are less protected than large corporations. Rather than assuming that online criminals just go where the money is, it is more helpful to assume that they will go where they can get the money most easily.
12345-
2012 NCSA/Symantec Small Business Study Fact Sheet 2012 NCSA/Symantec Small Business Study Fact Sheet PWC Information Security Breaches Survey 2012 2012 NCSA/Symantec Small Business Study Fact Sheet Symantec Internet Security Threat Report, Volume 17
Good for security, good for business Symantec Endpoint Protection Small Business Edition 2013 Know your enemy
The key to protecting your business from online threats is to understand what those threats are and just how easily they can impact your business. Developing a security strategy is much easier when you know what you are fighting. Below are some of the biggest threats: 1. Complacency. By far the biggest danger to small businesses is failing to keep up to date. The Symantec Internet Security Report found that patches were available for all five of the most-attacked software vulnerabilities in 2011, but they were still being exploited because "a proportion of the user base can't, won't or don't install patches or install a current and active endpoint security product."
7 6
2. Rapidly evolving threats. For a third of small businesses, malware and virus infection were the cause of their worst security breach of the year. You also need to ensure that your security software keeps pace with the threats. This means choosing a security vendor with global resources so that they can detect emerging problems and fix them quickly. It also demands comprehensive security software that is able to update all your company's desktops, laptops and servers automatically. 3. Targeted attacks. Small businesses are increasingly the focus for targeted attacks. These concentrate on a single company, or sometimes an individual employee, using tailored emails to try and get the recipient to click on a malicious attachment or link. Such attacks won't just focus on the CEO or accounts manager, but also employees that commonly receive unsolicited emails, like HR or sales. If the attack is successful and the malware is undetected, it could sit quietly stealing information, such as bank and email passwords, until you realise your money's missing or your customers' information has been compromised. 4. Infected and malicious websites. It is no longer always necessary for criminals to dupe people into opening email attachments; instead they can initiate a 'drive-by' attack when someone visits an infected website. These are harder to avoid than you would think: it is estimated that 61% of malicious sites are actually regular web sites that have been infected. And yet, half of small businesses don't even have basic web blocking and logging software. Symantec Endpoint 2013 identifies unsafe and dangerous websites right in the search results. 5. Human nature. A recent BBC article highlighted just how easily humans can be tricked and teased into taking action that ultimately puts them at risk online. We are curious, gullible, greedy and sometimes lazy. A clear online security policy can make a surprising difference to how well you are protected as a business. "Virus infections occurred in 63% of organisations that don't provide staff with security awareness training," reported PWC, "but in only 43% of those that have a program of continual security awareness." And for those occasions when we slip, a security system that scans all downloaded files and apps is an essential insurance policy.
11 10 9 8
67891011-
Symantec Internet Security Threat Report, Volume 17 PWC Information Security Breaches Survey 2012 Symantec Internet Security Threat Report, Volume 17 PWC Information Security Breaches Survey 2012 Viewpoint: How hackers exploit the seven deadly sins by Prof Alan Woodward PWC Information Security Breaches Survey 2012
Good for security, good for business Symantec Endpoint Protection Small Business Edition 2013
It also lets you pay by subscription. This means your costs vary in line with your headcount you don't need to prepay for software you may not use. Also, the cost comes out of your operational budget rather than the capital account. Your concern Hardware I can't afford the upfront costs needed for an on-site security system. I can't justify spending that much of my capital on online security. Symantec Endpoint 2013's answer Symantec Endpoint 2013 can also be cloud-managed, meaning no hardware or set-up costs, just a subscription fee based on the number of users. Online security becomes a manageable operational cost rather than an overwhelming capital expenditure. I have employees based at several different locations and some are on the road a lot. Managing the security on all of those devices takes too much time. If you chose to host Symantec Endpoint 2013 on the cloud then updates can automatically be pushed out to all users, no matter where they are, as long as they have an Internet connection. It also means you can centrally manage and monitor all your company devices from one place. People and places My business is based at a single location and I prefer to keep all of my systems and management hosted onsite. Symantec Endpoint 2013 is designed for on-site or cloud hosting, with the ability to switch from a managed on-premise service to a cloud-managed one at any time. Stay hands-on for as long as you want, knowing you have the flexibility to change should your business expand beyond your current location. I don't have the staff to run a complicated online security system, and I'm no IT whizz. If you choose the cloud-managed service, you can be up and running in minutes with no training or specialist knowledge required. No matter how you host there are also options for third-party access for monitoring and management if you decide to employ a security partner. Specialist knowledge I already have technical experts on my staff, and I want them to continue to run my online security. In its cloud-managed guise, Symantec Endpoint 2013 provides access to a management console where you can manage security settings for individual devices, monitor activity and create reports.
Good for security, good for business Symantec Endpoint Protection Small Business Edition 2013
About Symantec Symantec protects the worlds information, and is a global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our worldrenowned expertise in protecting data, identities, and interactions gives our customers confidence in a connected world.
Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 05/2013 21289502_DT_CB