Now is the Time for Security Software
by Bitdefender Security Specialists, on 14 June 2011
It's important to defend the integrity of your business, its partners, its clients, and other associates. With that in mind, more businesses should begin to understand the need for security software due to recent attacks on Google's Gmail accounts. The 'it can happen to you' sentiment is bigger than ever.
Other interesting angles of the story make the topic of security software peripheral; there has been debate on whether or not China was at fault and a rogue culprit in the hacking of Google. Chinese government officials vehemently oppose any connections to the security breach.
Recently, Google announced it had identified and discontinued a phishing campaign designed to hijack Gmail accounts of senior U.S. and South Korean government officials as well as military personnel and Chinese journalists.
Though the Chinese government denies participation and Google’s allegations, Google traced the origin of the attacks to Jinan, China. Coincidentally, Jinan was linked to a 2009 attack on Google’s network.
United States’ officials state they are “looking into” the matter. Secretary of State, Hillary Clinton, has stated the U.S. is concerned about the issue and the possible tie to China. The Federal Bureau of Investigation is expected to lead the investigation.
Whether it was to divert attention or out of genuine shock and appall, representatives of the Chinese government stated the accusations to be “unacceptable” as well as stating it was “impudent” to stain China’s name without definite proof to support the allegations.
How did Google detect the phishing endeavor? The company’s internal security software, especially designed to warn the company of suspicious behavior amongst Gmail accounts, sounded the alarm.
China’s involvement in the matter is still uncertain, yet one thing is clear; Google’s security software did its job well.
Your company may not be as big as Google, but security breaches can happen to you. Oftentimes, it’s too late for victims of a breach. Businesses must scramble to recover lost data, detect where and how the breach occurred, and engage in uncomfortable public relations efforts to explain the matter publicly to current and potential clients and partners.
It could happen to you, but there are precautionary measures to take. Read about the reach of business security software and protect your company.
All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.
Bitdefender Security Specialists
Bitdefender Labs
On Jul.27.2011 10:09
Nancy Russell said
I HAVE SEEN THE YELLOW TRIANGLE TELLING ME THE COMPUTER MAY BE INFECTED ABOUT 1 WEEK AGO. I HAVE A MACBOOK LAPTOP AND WANT TO KNOW WHAT STEPS I SHOULD TAKE TO DETECT/REMOVE ALL MALWARE. COULD YOU SUPPLY A PHONE NUMBER SO I COULD TALK WITH SOMEONE?