Hi [[ session.user.profile.firstName ]]

Are SMB’s targets for Cyber Criminals?

The Internet is a force multiplier, allowing businesses of all sizes to reach more customers, better service those customers and ultimately be more competitive. By utilizing the Internet, many small and medium businesses can be much more successful. However technological advances cut both ways.
While improved connectivity, communication, and Web presence provide benefits to small and medium businesses (SMBs), it can also resulted in an increase of Internet based security threats and expose the business to criminal elements that they wouldn't normally encounter. If customers can find you so can cybercriminals. The most damaging cyber attack against small and medium businesses is when cybercriminals implant malware on a company's computers, and use that malware to gain access to the company's bank accounts via online-banking.
This webcast is designed to bring the growing cyberthreats and protection strategies to the attention of executives and employees of small and medium enterprises. In this webcast, IDC's analyst, using survey data, recent threat data, and insight, will provide the following information:
* Highlight threats and successful attacks directed towards SMBs
* Identify the special needs for SMB cybersecurity
* Explain companies' existing attitudes around cybersecurity
* Discuss the key security technologies SMBs should consider
* Highlight what features and support companies should look for from their security vendors
Recorded Apr 11 2012 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Charles Kolodgy, IDC Security Products Research Vice President
Presentation preview: Are SMB’s targets for Cyber Criminals?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Webinar: Solving the “password1” Problem: Why Businesses Need 2FA Recorded: Oct 13 2016 62 mins
    Ben Reed, Senior Technical Strategist and Sales Engineer and Robert Westervelt, Research Manager, IDC Security Products
    Why have two-factor authentication (2FA) in the workplace? Even if you’ve instituted password management best practices, employees will still use their work password on other websites, write their passwords on sticky notes, or use their nicknames or birthdays without a second thought—and put your business at risk.

    With new PCI-DSS regulations surrounding multi-factor authentication requirements coming up on Oct. 31, it’s time to get up to speed on this proactive technology.

    In this webinar, Robert Westervelt, research manager of IDC’s Security Products group, and ESET’s solutions engineer Ben Reed will provide an in-depth overview of the following:
    •Account credential theft: What can be done to prevent employees from falling into a trap?
    •How 2FA/multi-factor authentication can reduce the risk of account hijacking, mitigate weak passwords and help satisfy compliance requirements.
    •The types of multifactor authentication solutions available on the market and how it can contribute to creating a stronger security culture in the workplace.
  • Webcast: Do More with ESET Remote Administrator Recorded: Aug 31 2016 61 mins
    Ben Reed, Sr. Technical Content Strategist and Sales Engineer
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Webcast: Mid-Year Threat Review Recorded: Jul 27 2016 59 mins
    Stephen Cobb, Senior Security Researcher, ESET
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Your Top 5 IT Security Threat Questions Answered Recorded: Jun 29 2016 37 mins
    ESET North America & Michael Aguilar, Business Product Technical Lead
    Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!

    With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
  • Encryption decoded: What you need to know before you buy Recorded: Jun 8 2016 43 mins
    Ben Reed, Partner Sales Engineer
    Interested in encryption, but not sure where to start? Watch “Encryption: Decoded” for insights on how to select the right solution for your environment.

    Join an ESET sales engineer for this in-depth review:
    • What pain points encryption can address
    • What to ask encryption solution providers
    • How to successfully implement encryption policies
  • Ransomware: Dark Money and Emerging Threats Recorded: May 25 2016 55 mins
    Michael Aguilar, Business Product Technical Lead, ESET North America
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Encryption decoded: What you need to know before you buy Recorded: Apr 27 2016 49 mins
    Ben Reed, Partner Sales Engineer
    Interested in encryption, but not sure where to start? Watch “Encryption: Decoded” for insights on how to select the right solution for your environment.

    Join an ESET sales engineer for this in-depth review:
    • What pain points encryption can address
    • What to ask encryption solution providers
    • How to successfully implement encryption policies
  • Webinar: Under Attack: A Report on Cybercrime and Healthcare Recorded: Mar 30 2016 59 mins
    Stephen Cobb, Senior Security Researcher, ESET
    ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
  • Webcast: Realizing “Next-Gen AV’s” are not new Recorded: Feb 24 2016 60 mins
    Ben Reed, Partner Sales Engineer
    Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.

    Key takeaways include:

    1.Next Gen AV technologies – making sense of their claims
    2.A deep dive into ESET technology
    3.The difference between reactive vs. proactive technologies
    4.How ESET leverages the Cloud
    5.Best practices in evaluating AV technologies
  • 2016: Examining the Threatscape Ahead Recorded: Jan 20 2016 58 mins
    Stephen Cobb, Senior Security Researcher, ESET
    How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
  • Windows 10 is here - Are you ready to migrate? Recorded: Dec 16 2015 61 mins
    Distinguished Researcher, Aryeh Goretsky, ESET North America
    Join Distinguished Researcher, Aryeh Goretsky, as we explore what's new in Windows 10 and how to make sure your company is ready to migrate.
  • Managed Services - the shifting IT landscape Recorded: Dec 2 2015 60 mins
    Justin Ryhal, Sr. Solution Strategist, LabTech Software
    End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
  • EMV Mandate - What businesses need to know Recorded: Oct 28 2015 59 mins
    Stephen Cobb, Sr. Security Researcher
    The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
  • AV is Not Dead Recorded: Oct 21 2015 61 mins
    Aryeh Goretsky, Distinguished Researcher, ESET
    Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
  • Women In Security Recorded: Sep 15 2015 44 mins
    Lysa Myers, Security Researcher, ESET North America
    In advance of October's Executive Women's Forum, Security Researcher Lysa Myers will look at the evolving landscape for women in IT, risk management, information security and other privacy industries.
  • Seven Ways Malicious Code Enters Your Virtual World Recorded: Aug 26 2015 54 mins
    Cameron Camp, Security Researcher
    Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
  • Black Hat Recap – Implications for the Enterprise Recorded: Aug 12 2015 58 mins
    Cameron Camp, Security Researcher
    Join Security Researcher, Cameron Camp, as he reviews the latest in cyber security covered at this year's Black Hat Conference.
  • The Hacking Team Hack: Lessons Learned for Enterprise Security Recorded: Jul 22 2015 57 mins
    Stephen Cobb, Sr. Security Researcher
    Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

    Key takeaways:
    •How Hacking Team’s mistakes mirrored those made by Sony
    •How employees’ weak passwords helped facilitate the breach
    •How transparency would have helped Hacking Team’s credibility
    •Why every company must review what might be exposed in a breach
  • Mac Security for Business Recorded: Jul 8 2015 37 mins
    Dave Howard, Instructional Designer and Don Lewis, Solutions Marketing Manager
    Learn how to protect the Mac platform in your business.
  • Cyber Security: The Millennium's Hot Career Recorded: Jun 24 2015 55 mins
    Christopher Simpson, National University
    Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are SMB’s targets for Cyber Criminals?
  • Live at: Apr 11 2012 5:00 pm
  • Presented by: Charles Kolodgy, IDC Security Products Research Vice President
  • From:
Your email has been sent.
or close