Small Business Security
10 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Trend Micro from Your Privacy & Security Online
Scoop.it!

Real damage of cybercrime may be counted in job losses, not dollars, says CSIS report

Real damage of cybercrime may be counted in job losses, not dollars, says CSIS report | Small Business Security | Scoop.it

Real damage of cybercrime may be counted in job losses, not dollars, says CSIS report (Real damage of #cybercrime may be counted in job losses, not dollars http://t.co/zoKixWWxjr @CSIS #jobs)...


Via Kathy Szczesny
more...
No comment yet.
Scooped by Trend Micro
Scoop.it!

Balancing Freedom and Control: Managing Consumer Applications

Balancing Freedom and Control: Managing Consumer Applications | Small Business Security | Scoop.it

Business users have adopted the use of consumer applications in the workplace for both business and personal purposes. However, its usage may also bring...

Trend Micro's insight:

Business users have adopted the use of consumer applications in the workplace for both business and personal purposes. However, its usage may also bring security risks to company data. Be worry-free with Business Security Advanced: http://www.trendmicro.com/us/small-business/product-security/worry-free-advanced/index.html

more...
No comment yet.
Scooped by Trend Micro
Scoop.it!

Mobile Security for the SMB: Mac vs. Android Threats

Mobile Security for the SMB: Mac vs. Android Threats | Small Business Security | Scoop.it
With the rise of BYOD, worms, scareware, spyware, and other menaces have popped up on both the Mac and Android platforms.
Trend Micro's insight:

We’ve seen the fast pace in which SMBs are adopting mobile devices, with Bring Your Own Device (BYOD) as way to help small business owners save time, increase revenue, reduce costs, and drive productivity.  In a recent survey,2012 Information Security Breaches Survey (ISBS), PricewaterhouseCoopers found that more than 61% of SMBs in the UK allow personal smart phones to be used for work, rather than providing their employees “work” phones.

Following that trend, Forrester found that 43% of SMBs are now reporting support for mobile devices and smartphones as a key priority. With the number of Android devices in use reaching that of PC’s globally, it’s no surprise that we’ve recently seen a huge increase in dangerous applications targeting Android devices.

One of the most notable findings in Trend Micro’s Q3 security roundup research was the six-fold growth in risky applications for Android. From June to September 2012, these applications grew from just 30,000 in number to almost 175,000. With only 20% of Android-based devices have security apps installed, now is the time to think about Android security.

In addition, in another Forrester report, Apple Infiltrates the Enterprise, they found that 40% of small businesses now use Mac devices – and that number is growing. So, while Android devices may be getting a lot of attention from nefarious software developers, that doesn’t mean that Macs have escaped the notice of cybercriminals. In fact, the growing popularity of Macs at work means they present a larger target for hackers – with a bigger payoff at the end. So it’s time for small businesses to get serious about Mac security.

Worms, scareware, spyware, and other menaces have popped up on both the Mac and Android platforms, and with the rise of BYOD, small businesses will need to implement policies that cover these platforms.

Does your small business include Mac and Android devices in their security policies?

____________________________

Learn how to implement a BYOD policy for your small business in our upcoming post: Bring Your Own Device (BYOD):  How to Protect Your SMB Company Information

Looking for help with managing Mac and Android devices? Trend Micro™ Worry Free™ Business Security Services (http://www.trendmicro.com/us/small-business/product-security/worry-free-services/index.html) supports the Android and Mac platforms with features such as App Scanning and Web Reputation.

more...
No comment yet.
Scooped by Trend Micro
Scoop.it!

The Danger of Compromise

The Danger of Compromise | Small Business Security | Scoop.it

As threat actors move deeper into the network, their movements and methods become difficult to detect..."

Trend Micro's insight:

As threat actors move deeper into the network, their movements and methods become difficult to detect especially when they utilize tools also used by IT administrators. What does happen when APTs move laterally inside target networks? Be worry-free with Business Security Advanced: http://www.trendmicro.com/us/small-business/product-security/worry-free-advanced/index.html

more...
No comment yet.