Tag Archives: Business

When the boss is the biggest threat to a company’s security

boss

Every company works with valuable information about its business what needs to be kept behind closed doors. The employees with access to this information have to be aware of its importance and their obligation is to keep it safe, but what happens is one of them leaves the company?

As we have already drawn attention to on various occasions, few companies are prepared to face this event and the majority don’t take adequate precautions before and after an employee leaves or is fired. In fact, according to a study by Osterman research, 89% of workers keep the user name and password of their corporate accounts after leaving their jobs, and nearly half admit having used these to access their old accounts.

If this happens with any member of the team, no matter how low-ranked they may be, imagine the potential for problems if an executive is fired – someone who occupies a high-ranked position with access to lots of sensitive information.

The main risk is that the company’s intellectual property could end up in the hands of others, something which, unfortunately, happens all too often. This example explains it better – in 2014 the startup transport collaborative Lyft went to court after its COO left the company to join its main rival, Uber.

He took with him confidential information relating to the business and this serves as an example for all businesses that these situations are real and they need to be prepared for them.

mouse

It might seem like a job for the legal department, but IT security also plays an important role in all of this in two distinct ways: it avoids the theft of intellectual property and, in the worst of cases, gathers evidence to show that such a theft happened in the first place.

When the thief is the boss, however, it is usually a little more complicated. It’s difficult to avoid them having passwords to different services and tools, while also being hard to stop them using their own devices to access them from anywhere they want (especially if it is their job to resolves problems relating to various different departments).

Taking away access as soon as they walk out the door (and getting back the company mobile, tablet, and computer) would be of little use as they’d already have had multiple opportunities to copy valuable information. The best thing to do is remind them of confidentiality clauses in their contracts that they signed when joining the company, and to complete an exhaustive review of their activities during their final weeks.

tie

It’s normal that businesses, especially larger ones, do this before hiring: reviewing previous records, asking for recommendations, rigorous selection processes, etc. However, these measures are hardly ever taken into consideration when someone leaves a company.

With an eye on making this task easier, there is a dedicated software that allows for the monitoring of computers to avoid leaks. Panda Security has developed the ideal solution for large businesses, Adaptive Defense 360, which combats information theft and both external threats (malware, for example) and internal ones (an employee copying files onto a USB from the cloud).

When it comes to a high-ranked employee who decides to switch over to the competition, both prevention and reaction are more difficult. Sometimes the boss can be the biggest danger to a business, even if it isn’t immediately obvious.

The post When the boss is the biggest threat to a company’s security appeared first on MediaCenter Panda Security.

The need for managed services will continue to grow in 2016 — AVG Business is here to support you

Industry research is already indicating the growth of managed services in 2016 as the channel continues to recognize its potential for SMB clients.  According to one recent study from market research organization Techaisle, as much as 71% of U.S. SMB channel partners surveyed are currently offering one or more managed services solutions and another 18% are planning to offer the services within the year.

Here at AVG Business, that’s no surprise. More of our partners are moving toward a proactive approach and transitioning to managed service models, moving away from reactive strategies that are difficult to manage and maintain for their SMB clients.

Yet, successful implementation is key to unlocking the power of managed services. Simplifying the experience for both the partner and SMB customer is critical.  Depending on the technology in place or the type of service contract, there could be multiple steps required before both the channel partner and SMB can realize the benefits of a centrally planned and automated security defense.

The benefits of this type of defense reach far and wide.  A centrally planned solution enables AVG channel partners to efficiently deliver their unique service offerings within one standardized service delivery platform. This puts automated, service standardization in place to enable a scalable offering to better address the security needs of their SMB customers.

At AVG Business, we’re committed to helping our partners effectively unlock the power of all AVG security solutions in their marketing, selling, and implementation of managed services so they too can see the magic behind this proactive, planned and automated approach.

Here are just a few of the AVG partners experiencing great results:

  • Dave Barnard, owner of DB Computer Services came to AVG Business because he’d been told by a friendly competitor that our AVG Managed Workplace solution had “every tool a MSP needs” something we were happy to prove. According to Dave, DB Computer Services is now able to “offer an outsourced IT support solution that is complete, simple to understand, predictable, affordable and scales with the growth of our clients’ businesses.” 
  • For Darren Nichol, the Technical Director of pckwikfix, the move to managed services was about “standing out in the crowd by continuing to truly care and put our customers before sales targets.” The proof of this came just a few weeks after purchasing AVG Managed Workplace – the team was able to convert more than 50 clients to the streamlined monthly subscription model. With routine jobs now automated, fully integrated systems and access to unprecedented detail, Nichol says the team is “starting to get a feel for the freedom we now have to be more hands on with customers’ more interesting challenges.”
  • Meanwhile Chris Carter, technical infrastructure consultant at APH, was so convinced by AVG Managed Workplace’s new premium remote control feature, plus the quality of our technical and sales support, that it migrated its entire base of managed service clients from a standard antivirus product to the full-service AVG Business platform.

We have done a lot of work toward addressing the business needs of AVG partners, including within our AVG Managed Workplace technology platform, as well as best practices on how to fulfill service contracts in the most efficient and profitable way.

We are listening and responding – and we will have more updates and news to share this year.

Until then, please continue to share your feedback in 2016!

AVG Named One of 2016’s Coolest Cloud Security Vendors

It has been a cold month for all the right reasons this January as AVG has just been named one of CRN’s Coolest Cloud Security Vendors for 2016. This is the second consecutive time AVG has made the list, and it’s validation of our hard work over the last twelve months. We’ve been busy and – more importantly – focused on providing even more value for our AVG Business partners and their SMB clients in 2016.

In CRN’s recent recognition, the IT channel publication noted our cloud security and remote monitoring and management (RMM) capabilities for businesses. We continue to see AVG partners transition to solutions such as AVG CloudCare and AVG Managed Workplace as security becomes a higher priority for small business owners and their IT staff.  When you couple this with our advanced Business Edition security products, it’s easy to see the value in our AVG Business solutions.

Earning the recognition as a ‘cool cloud security vendor’ also reflects our commitment to ensuring cloud solutions like AVG CloudCare are easy to implement and manage, simplifying the experience for partners and their SMB end-users.

AVG CloudCare is a single cloud platform that enables the real-time management of a full suite of cloud-based security services including antivirus, online backup (OLB), and a number of other key features.

If you’re not sufficiently impressed by our ‘cool’ credentials already, here are a few more top reasons why you should consider investigating AVG CloudCare for yourself:

  • Ease of Use – AVG CloudCare’s online dashboard is well designed and easy to use for managing desktops, laptops and servers all at a glance.
  • Remote Deployment – As long as one device is on the network, AVG CloudCare can be deployed to any computer attached to the network from the web console.
  • Remote Updates and Scans – AVG CloudCare administrators can force definition updates and scans remotely.
  • Dashboards and Reporting – AVG CloudCare administrators can view all managed devices through an online dashboard showing their status.
  • Content Filtering – As an add-on, content filtering can protect your client’s business from malicious websites and increase productivity by disallowing certain groups of sites.

This recognition is also a true testament of the continued support from our partner and SMB community. As we head into 2016, we remain committed to helping solve today’s business security challenges and helping businesses be productive and successful.

Thank you for your support!

Six things to think about in the new year

Here are six things to think about for this year, with business security strategy top of mind…

1. Artificial Intelligence keeping us safe online
Artificial intelligence and machine learning isn’t just about robot dogs and self-driving cars. The latest AVG Business anti-malware products contain a number of sophisticated neural learning and cloud-data collection techniques designed to catch malware earlier and more often. Expect to hear more through 2016 about how artificial intelligence will help transform security solutions to help keep malware at bay.

2. Certificate Authorities: beginning of the end
SSL continued to be a big talking point in 2015 with further vulnerabilities being disclosed. This year the debate will continue around certification, development of new open standards and easier choices for website owners. Every news story about certificate mismanagement, security mishaps, and data breaches puts Certificate Authorities under increasing scrutiny. For many small businesses, the website owners paying a Certificate Authority and submitting themselves to what can sometimes be an arduous verification and checking process, is cumbersome and unnecessary.

This is where technical alternatives like Let’s Encrypt (currently in beta) are bound to flourish.

Additionally, Google’s Certificate Transparency project will continue to identify rogue SSL Certificates through detections built into modern day web browsers, as Google continues to hold Certificate Authorities to account – helping keep us all safer.Lastly, with the promise of other solutions such as the Internet Society’s proposed DANE protocol, offering the ability for any website owner to validate their own SSL certificate and therefore bypass a Certificate Authority altogether, 2016 will be an interesting year to watch!

3. Malvertising, Ad Networks: shape up, or ship out
Malvertising is what happens when malware is served up to innocent web site visitors; it’s happening all too frequently and is caused by questionable third party relationships and the poor security of some online advertising networks. At the root of this problem is the “attack surface” of ever-growing, ever-complex advertising and tracking “scripts” provided by ad networks and included by publishers (often blindly) on their websites. The scripts are slowing the browsing experience and anyone who has installed an ad blocker recently will tell you they can’t believe how fast their favourite websites are now loading. Research conducted by The New York Times showed that for many popular mobile news websites, more than half of the bandwidth used comes from serving up ads. That’s more data from loading the ads, scripts and tracking codes, than the content you can see and read on the page!

Whatever the solution, one thing is for certain, Ad Networks need to shape up and address their security, otherwise 2016 may well be remembered as the year of Malvertising.

4. Augmenting passwords with extra security steps in 2016
The need for strong passwords isn’t going anywhere in 2016. There were reminders in 2015 that even having the world’s longest smartphone passcode doesn’t mean someone can’t figure it out.

This year, there will be growing use of extra steps to make accessing data safer. In 2015, Yahoo announced a security solution using mobile devices rather than a password for access, and we even saw Google include Smart Lock features that can use the presence of other nearby devices to unlock your smartphone. Two-factor authentication – using two steps and ‘something you have and something you know’ to verify someone’s identity – will continue to be popular for use by many cloud-based providers looking to avoid data breaches.

5. The Internet of Things needs security by design
Every device seems to be getting smart – in the home and in the office. You’re likely going to be using your smartphone as a “lifestyle remote” to control a growing array of devices. Being able to set the office temperature remotely, or turn on the kettle in the communal kitchen without leaving your desk may sound helpful, but the devices have the potential to give up WiFi keys. Every unprotected device that is connected to a network is open to hacking. Cyber criminals are probing hardware, scanning the airwaves, and harvesting passwords and other personal identity data from wherever they can. So the advice is simple: every connected innovation needs to be included in your business-wide security.

6. Update and upgrade or face the financial and legal consequences?
Upgrading and updating all your software, devices, gadgets and equipment remains a vital business issue. The Internet of Things is raising new questions about who is responsible for what in a legal sense. Who owns data? What happens when machines take “autonomous” decisions? Who is liable if something goes wrong? To take one extreme example, a police officer pulled over one of Google’s driverless cars in November for causing a traffic jam on one Californian highway by driving too slowly. Again, the lesson is clear. The simple rule this year is to ensure that your business software and systems are always using the latest update. Your life may not depend on it, but your livelihood might.

So these are my six “thinking points” as we head into 2016.

Here at AVG, we look forward to helping you keep security front and center for your business this year. For more information on AVG Business security solutions that keep devices, data and people protected every day, across the globe, visit http://www.avg.com/internet-security-business.

Five things to learn from 2015

Here are my five things we discovered in the last 12 months.

  1. Big brands being hacked grabs headlines – but the story can start with a small business.
    The hack and release of personal data from the adult dating site Ashley Madison probably got the most media attention of all the security breaches in 2015, but it was far from the only one. The list of familiar brands and organizations that suffered confidential data breaches ranged from VTech the children’s toy manufacturer, to the US Internal Revenue Service, to the UK’s phone and broadband internet provider, Talk Talk. There was even a “live demo” of a Chrysler-Jeep being hacked on the highway. How do hackers get in? A common tactic is via employees innocently clicking bogus links in emails or bringing malware-infected personal devices into the workplace. Crucially, hackers can find their way into big brands via small company suppliers where security may be weaker. The message is simple: all businesses need to ensure their online defences are as strong as possible.
  1. New payment methods: faster transactions but new threats
    2015 was the year that new payment methods really seemed to take off. On the one hand, “contactless” bank cards allowed consumers to make payments by tapping a card against a terminal without having to swipe and enter a PIN. But this use of RFID technology also gives cybercriminals a new opportunity to steal data – if they can get close enough.Likewise, smartphone payments – such as Apple Pay and Android Pay – are turning phones into wallets. That means thinking about your phone’s physical and cyber security. So is your business taking every possible step to keep its data – and customers’ data – as safe as possible in this new world of faster and mobile payments?
  1. Bring your own device can allow hackers through the office door
    How many of your employees bring their own mobile devices to work and use them to check and send work-related emails, access spreadsheets or other company data? So don’t forget to protect mobile devices in business, they are as vulnerable as desktop devices and carry business critical data. Two mobile hacks in 2015 reminded us all of how vulnerable smartphones can be: the MMS messages with a hidden sting, and the Stagefright 2.0 vulnerabilities in the Android operating system.
  1. Don’t think your Mac device is a safe bet!
    Part of the Apple myth is that its devices are always malware free; indeed, remember those old “I’m a Mac, I’m a PC” ads from the late 90s with the actor representing the PC catching a terrible cold versus the healthy young Mac? That myth was truly tested in 2015 when fake developer tools that were used to create iOS apps containing malicious code known as “XcodeGhost” made their way onto the Apple App Store. The moral of the story? If you’re using Apple tech, make sure you’re taking security seriously … you can still catch a cold.
  1. We’re only human!
    An error this year by an individual at the UK holiday firm Thomson was a timely reminder that however tight your online security, human beings make mistakes. Data about the name, home address, telephone number and flight information of 458 people were attached in error to an email. The simple lesson? Everyone should take a moment to think twice before attaching documents to an email and hitting send. Just ask the question: what I am sending and should this be shared in this way?

So there we are: five lessons from the outgoing year to remind us of the critical need to keep business security top of mind.

For more tips, insights and product information to keep your business protected, check out our web site at http://www.avg.com/internet-security-business. We look forward to helping keep you and your business safe as we head into the 2016!

Small Business Protection: Panda Security antivirus for microbusinesses and freelancers – Infographic

We’ve notice that the targets of cybercriminals are growing beyond private users and large corporations. Freelancers and microbusinesses are suffering daily attacks as they are an easy target for the bad guys and represent nearly 80% of the business sector in USA.

Thus, Panda Security designed a tailor-made solution: Small Business Protection. An antivirus that suits to your business needs: economical, quick and compatible with any PC.

Discover the advantages of Small Business Protection in this infographic!

 

PandaSecurity-Small-Business-Antivirus-Infographic

 

Is your company protected?

Cyberattacks on businesses is becoming more and more common, and these criminals have one clear goal: massive data theft.

Businesses are not equipped with security software on 25% of tablets and 35% of smartphones.

The origin of the infections are:

  • 39% Accessing unsecured websites.
  • 23% Downloading of programs from the Internet.
  • 19% Malware received by email.

What can be done to protect yourself against possible attacks?

The antivirus that protects small businesses from big threats.

The best antivirus for companies against online threats.

Small Business Protection!

What are the main benefits?

  • The protection you need with the best value for money.
  • Lightweight, powerful antivirus suited for new and older PCs.
  • Download it and get protected without any technical assistance.

The post Small Business Protection: Panda Security antivirus for microbusinesses and freelancers – Infographic appeared first on MediaCenter Panda Security.

The security risks posed by working from home

working from home

It offers greater flexibility for employees and makes them more productive – the work from home revolution, which is being offered by more and more businesses, allows workers to complete their jobs from the comfort of their own home. According to Eurostat, 35% of European businesses currently offer their employees the option of working from home.

Although this percentage is lower in some countries (the EU average is 12%, while in the UK the figure rises to 25%), the trend is clear, and businesses that have yet to embrace it do so for fears over security.

If employees manipulate information from their homes, the companies don’t have any control over the security that is in place, which leads to fears over the loss or theft of data.

The fear is logical as a home environment could be much more vulnerable than a corporate one, where the software of the servers offers greater security guarantees.

The existing risks are, in reality, quite varied and extensive. Data loss can arise in various different forms such as a failure in the system that deletes files that haven’t got a secure copy, the theft of a password, or even the computer itself. This could all result in a thief getting is hands on your company’s confidential information.

That said, working from home doesn’t have to be synonymous with danger. For employers to permit their staff to work from home, they first need to put in place a protocol that establishes rules for working from home or outside of the office.

home office

However, there are some measure that workers can take to avoid any shocks. To start with, the use of remote desktops is a possible solution. With them, it is possible to avoid information theft as they allow the employee to connect directly to the company’s server where the information is stored and where there are automatic security copies made.

Passwords and encryptions

Another key point for making working from home safe is the concern over passwords. The theft of that which the employees uses for accessing the company’s network while working out of the office could end up being disastrous, practically handing a huge amount of data to a cybercriminal.

Beyond the corporate server’s passwords, teleworkers that carry out their tasks from home should keep in mind that, when using services and tools on the cloud, that they follow certain steps in creating secure passwords. These including avoiding the use of the same password over and over, making sure to change it frequently, and using a password manager.

That said, passwords aren’t always enough. Although a remote desktop is useful for avoiding the storage of corporate information on a home computer, sometimes it is unavoidable.

In this case, apart from using a safe password, it is important to encrypt confidential information. This way you can avoid a laptop theft resulting in the theft of information. Encrypting archives via the operating system or encrypting the hard drive removes all of this risk.

One way or another, working from home is growing at an unstoppable rate thanks to technology, but it should mean that security has to suffer – the correct technology offers tools so that information isn’t at risk while workers complete their jobs from home.

The post The security risks posed by working from home appeared first on MediaCenter Panda Security.

Bluecom Buys Big from AVG Business

2015 has been a big year for AVG Business. Our worldwide community of partners has been supporting businesses in cities across the globe, giving their customers the reassurance that their applications and data are protected on any device, anytime, anywhere.

I’m excited to welcome a new partner, Bluecom, to our AVG Business network. Stockholm-based Bluecom, a rapidly-growing IT service provider, has recently chosen AVG Managed Workplace to manage network monitoring, control and automation for its small and medium business customers throughout Sweden.

This represents the largest order of the year for AVG Business in the Nordics region.

According to Bluecom CEO Robert Sjöholm, after conducting tests with several solutions on the market, AVG Business was selected because our product had the breadth Bluecom needed, “AVG Managed Workplace has all of the major functionality, while being more user-friendly than other products on the market we tried.”

Bluecom has already seen a positive effect on its sales since it started using AVG Managed Workplace, with Sjöholm noting that, “The reports we get from Managed Workplace are so good that we can often see flaws in customer systems that are unknown to them.”

AVG Business solutions like AVG Managed Workplace are a great example of how we are listening to our partners and responding with powerful security solutions to help partners proactively manage and monitor their customers’ networks and automatically deploy and update critical security tools.

With Managed Workplace 9.2, released in September, we move one step closer to a complete, end-to-end IT and managed security solution. The Managed Workplace platform streamlines IT management for our partners, providing ease of use, security and control of the entire IT infrastructure (devices, applications and networks) from a “single-pane” of glass. With premium remote control integrated at no additional cost to the remote monitoring and management platform, partners also gain cost savings as well as reporting tools to streamline billing and demonstrate client ROI.

Visit http://www.avg.com/partners to find out more about our AVG Business solutions and how we can help your business.  We look forward to sharing new products and services with you in 2016.

Happy holidays and best wishes for the new year!

4 Tips for Successful Online Sales over the Holiday Season

Christmas is nearly upon us, but is your website ready to make the most of it? In fact, let’s go one step further: are is your website, social media and IT systems all singing the same song?

Preparation and a co-ordinated set up is essential if you’re going to make the most out of any uplift in customer attention and desire to buy from small businesses instead of the big brands.

You can have a killer website but if your social media channels aren’t up-to-date too then you’ll look behind the times and disorganised.  If your IT systems that enable you to take, process, and dispatch orders aren’t up to scratch, then any online sales you do make might go to waste.

The web is available 24/7/365 – this is as level a playing field as it gets for small business, especially when advertising and marketing budgets don’t match those of the large and well established brands.

Customers can be fickle and have short attention spans too, hopping from website to website in a matter of seconds if they don’t see what they’re looking for. This is the same for all businesses, but it underlines the importance of having everything ready, up to date and aligned.

Here are four things you can do to make the most of the holiday season for your small business online:

1. Have a dedicated webpage and keep it live all year round
Have a dedicated web page on your site for popular sales events like Small Business Saturday, Black Friday and Cyber Monday… and keep it live all year round! That might sound counter-intuitive when we’re only talking about one day in the year, but there’s a very good reason you should do this. Once a web page is live it’s far easier to manage: the basic structure can stay the same even if the copy and imagery change. Plus, people don’t always follow the rules when it comes to searching for offers and deals online – they’ll start searching for them whenever the mood takes them, wherever they happen to be. As recent research reveals, when people start looking for information about a purchase, they could be doing it using a mobile on the train, a desktop PC at work, or a tablet when they’re snuggled up in bed.

For example, If they start searching for details about Small Business Saturday in September and October – as Google search data shows – then having your web page already live will allow people to find you. Currys use this tactic with their Black Friday web page.

If you take down your page after the event, then search engines won’t be able to show it to customers whenever they start searching for it next year. They’ll draw a blank and you’ll be starting from square one all over again. Why shoot yourself in the foot? Competition for online orders is tough enough as it is.


2. Facebook is a great starting point for a conversation
“Like” it or not, Facebook is a force to be reckoned with. 84% of internet users between the age of 35-44 are on at least one Facebook service, meaning Facebook, Facebook Messenger, Instagram or WhatsApp. That figure goes up to a whopping 90% for 16-24 year-olds. This is where your customers – existing and future – are likely to be spending a lot of their social media time, so if you’re not on there, they won’t see you.

Make sure you’ve set up a Facebook business page. They won’t want to see a constant stream of sales related messages though. Imagine your business page to be a little bit like your personal Facebook page: it should express the everyday goings on and personality of your business. And in between those posts, you can publish business event or sales related messages. If you’re short on ideas, have a look at how other small businesses have used Facebook to grow their business.


3. Make sure your IT system is safe and secure
If it’s the one day in the year you definitely don’t want to be hacked it’s when you’ve just taken a large number of online orders. We can all remember the Ashley Madison scandal and countless other big brands being hacked and losing customer data over the years. A survey of UK businesses conducted this year also reveals nearly nine out of 10 large businesses said they had suffered some form of information security breach in the last year. Don’t be fooled into thinking it can’t happen to a small business. Hackers – and the viruses they release into the world – will target anyone they think might have weak website security.


4. Ask the experts
If you are concerned your ecommerce and supporting IT system aren’t as secure or co-ordinated as they could be, ask for help. There’s a whole host of free resources for small businesses all over the web to help you understand how healthy and secure your IT system is. For example, AVG’s free IT Security Health Check is a good place to start if you’re not an expert with little time on your hands. It’s short and sweet and offers straightforward tips for how to improve your IT security. The UK government is also offering Innovation Vouchers worth £5,000. These can be used to pay for advice which will help protect and grow your business by having good cyber security in place.

 

At the end of the day

Gearing up your website, social media and IT systems to make the most out of the holidays is only half the battle. Making sure they stay safe and secure, and continue to serve you and your customers well, is the other half.

Panda Security launches Small Business Protection, the cybersecurity solution for microbusinesses and freelancers

small business antivirus

Online threats don’t just affect private users and large corporations. Freelancers and microbusinesses, which in the USA account for nearly 80% of the business sector, are an easy target for cybercriminals.

To help them stay protected against the 230,000 malware samples that are created daily, Panda Security has launched Small Business Protection, the new antivirus for freelancers and microbusinesses that protects them against large threats. Now, these companies can rely on a solution that eliminates, in real-time, all types of viruses and threats on IT devices.

Amongst the main characteristics of Small Business Protection is its ability to protect against both known and unknown threats, thanks to a security model based on the supervision of processes and the control of applications that run on the company’s computers.

This allows Panda to offer these types of businesses a complete protection that also protects against online fraud, identity theft, phishing attacks, and other threats. What’s more, in no way will it affect the performance of the devices as it is a lightweight and responsive product.

Wi-Fi protection against hackers and intruders

One of the daily battles that microbusinesses face is keeping their corporate data free from threats via Wi-Fi connections. To combat this, Small Business Protection includes a security model that detects weaknesses on the Wi-Fi network and protects against intruders. Thanks to a bidirectional firewall, corporate users can browse on the network in peace, without interruptions, and protected against unwanted connections.

Furthermore, Panda Security has incorporated a series of periodic tips and recommendations in Small Business Protection so that its users can increase the security of their network without needing to be IT experts.

“With Small Business Protection we wanted to help freelancers and microbusinesses to protect their business. They need the same protection as a large organization and by using free antiviruses, or inappropriate solutions, they are putting their company’s security at risk,” claims Alejandro García, Panda Security’s Head of Global Strategy. “This solution is particularly relevant for the USA, where approximately 80% of businesses consist of 9 employees or less.”

Small Business Protection is a product designed so as to allow freelancers and SMEs to focus their attention on the correct development of their business, removing any barrier that gets in the way of this, including cybersecurity. An intuitive and simplexity version of Panda Security’s best protection just for them.

To get more information on Small Business Protection, enter here.

The post Panda Security launches Small Business Protection, the cybersecurity solution for microbusinesses and freelancers appeared first on MediaCenter Panda Security.