Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3251 - 3275 of 3727Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec     Published Date: Jun 13, 2018
O Regulamento Geral de Proteção de Dados (GDPR) entrou em vigor em 25 de maio de 2018. Se você processa dados pessoais da União Europeia (UE), o GDPR provavelmente aplica-se a você, mesmo se você não estiver na UE. Isso porque o regulamento é global em seu escopo e se aplica a qualquer organização que processa dados pessoais da UE, independentemente da localização das empresas ou do processamento dos dados. Na sua essência, a legislação do GDPR foca em como garantir que a privacidade seja respeitada como um direito fundamental e que os dados pessoais sejam mantidos em sigilo e segurança. Elizabeth Denham, do Gabinete do Comissário de Informações da UE (ICO - Information Commissioner Office), diz: “Esta lei não é sobre multas. Trata-se de colocar o consumidor e o cidadão em primeiro lugar” e “A emissão de multas sempre foi e continuará sendo, um ultimo recurso”. No entanto, é importante observar que os custos de não cumprir o regulamento podem ser rigorosos. Podem incluir uma multa de a
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Hosted security is an efficient and cost-effective solution for many midmarket organizations. Learn how to evaluate hosted security services, and make a business case for reliable security with predictable costs.
Tags : 
messagelabs, symantec hosted services, hosted security provider, total cost of ownership, tco
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : 
messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance, legal discovery
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking, hosted web security, content filtering
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Feb 12, 2010
IT security needs to work seamlessly across email, web & IM to protect against the latest Converged Threats - FREE Whitepaper
Tags : 
messagelabs, symantec hosted services, converged threat, it security, web security, malware, messagelabs security safeguard
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email
Tags : 
messagelabs symantec hosted services, email, security, botnets
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email, web, and IM secure is a complex and daunting task. Learn how a hosted solution can provide security and available communications.
Tags : 
messagelabs symantec hosted services, email, security, web security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, california edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, massachusetts edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, michigan edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, nevada edition
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, washington edition
    
Symantec.cloud
Start   Previous    124 125 126 127 128 129 130 131 132 133 134 135 136 137 138    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.