McAfee – McAfee Blogs https://securingtomorrow.mcafee.com Securing Tomorrow. Today. Tue, 13 Aug 2019 19:08:50 +0000 en-US hourly 1 https://securingtomorrow.mcafee.com/wp-content/uploads/2018/11/cropped-favicon-32x32.png McAfee – McAfee Blogs https://securingtomorrow.mcafee.com 32 32 Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win-2019/ https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win-2019/#respond Tue, 13 Aug 2019 19:00:04 +0000 https://securingtomorrow.mcafee.com/?p=96302 It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end, it’s time to get those college cybersecurity priorities in order so you can have the best school year yet. As students across the country get ready to embark on—or return to—their college adventure, many are […]

The post Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win appeared first on McAfee Blogs.

]]>
It’s time to unpack the suitcases and pack up those backpacks! With the summer season quickly coming to an end, it’s time to get those college cybersecurity priorities in order so you can have the best school year yet. As students across the country get ready to embark on—or return to—their college adventure, many are not proactively protecting their data according. A recent survey from McAfee. found that only 19% of students take extra steps to protect their academic records, which is surprising considering 80% of students have either been a victim of a cyberattack or know someone who has been impacted. In fact, in the first few months of 2019, publicly disclosed cyberattacks targeting the education sector increased by 50%, including financial aid schemes and identity theft.

From data breaches to phishing and ransomware attacks, hitting the books is stressful enough without the added pressure of ensuring your devises and data are secure too. But you’re in luck! Avoid being the cybersecurity class clown and head back to school in style with our A+ worthy Back-to-School RT2Win sweepstakes!

Three [3] lucky winners of the sweepstakes drawing will receive a McAfee Back-to-School Essentials Backpack complete with vital tech and cybersecurity supplies like Beats Headphones, UE BOOM 3 Waterproof Bluetooth Speaker, Fujifilm Instax Mini 9 Instant Camera, DLINK router with McAfee Secure Home Platform, Anker PowerCore Portable Charger and so much more! ($750 value, full details below in Section 6. PRIZES). The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Tuesday, August 13, 2019, at 12:00pm PT. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Sweepstakes will end on Monday, August 26, 2019 at 11:59pm PT. All entries must be made before that date and time.
  • Winners will be notified on Wednesday, August 28, 2019, via Twitter direct message.
  • Limit one entry per person.

1. How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win AND #Sweepstakes” for a chance to win a McAfee Back-to-School Essential Backpack (for full prize details please see “Prizes” section below). Three [3] total winners will be selected and announced on August 28, 2019. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

#RT2Win Sweepstakes Terms and Conditions

2. How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Back-to-School #RT2Win Sweepstakes will be conducted from August 13, 2019 through August 27, 2019. All entries for each day of the McAfee Back-to-School #RT2Win Sweepstakes must be received during the time allotted for the McAfee Back-to-School #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Back-to-School #RT2Win Sweepstakes, duration is as follows:

  • Begins Tuesday, August 13 at 12:00pm PST
  • Ends: Monday, August 26, 2019 at 11:59pm PST
  • Three [3] winners will be announced: Wednesday, August 28, 2019

For the McAfee Back-to-School #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Back-to-School Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes
  2. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  3. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  4. Limit one entry per person.

Three [3] winners will be chosen for the McAfee Back-to-School #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Wednesday, August 28, 2019 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.  

3. Eligibility: 

McAfee Back-to-School #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Back-to-School #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Back-to-School #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

4. Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Back-to-School #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of three [3] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Back-to-School #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

5. Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by August 28, 2019. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty-four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above. 

6. Prizes: 

McAFEE BACK-TO-SCHOOL ESSENTIAL BACKPACK (3)

  • Approximate ARV for Prize: $750
    • McAfee Backpack
    • McAfee Water Bottle
    • McAfee Notebook
    • D-Link Ethernet Wireless Router with McAfee Secure Home
    • McAfee Total Protection, 5 devices, 1-year subscription
    • Beats EP On-Ear Headphones
    • Ultimate Ears BOOM 3 Portable Waterproof Bluetooth Speaker
    • Fujifilm Instax Mini 9 Instant Camera with Mini Film Twin Pack
    • Tile Mate – Anything Finder
    • Anker PowerCore 10000, Portable Charger

Limit one (1) prize per person/household. Prizes are non-transferable, and no cash equivalent or substitution of prize is offered.

The prize for the McAfee Back-To-School #RT2Win Sweepstakes is a ONE (1) Back-to-School Essential Backpack, complete with the above supplies, for each of the three (3) entrants. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Back-to-School #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Back-to-School #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

7. General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Back-to-School #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Back-to-School #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Back-to-School #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Back-to-School #RT2Win Sweepstakes-related activity, or participation in the McAfee Back-to-School #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

8. Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

9. Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with the prize McAfee Back-to-School #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Back-to-School #RT2Win Sweepstakes.

10. Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Back-to-School #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Back-to-School #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

11. Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of New York.

12. Privacy Policy: 

Personal information obtained in connection with this prize McAfee Back-to-School #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after August 13,2019 before August 27, 2019 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2019 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA
  4. Administrator: LEWIS, 111 Sutter St., Suite 850, San Francisco, CA 94104

The post Backpacks Ready, Pencils Up – It’s Time for a Back-to-School #RT2Win appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win-2019/feed/ 0
How McAfee’s Paternity Leave Helped My New Family https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-paternity-leave-helped-my-new-family/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-paternity-leave-helped-my-new-family/#respond Wed, 26 Jun 2019 14:53:42 +0000 https://securingtomorrow.mcafee.com/?p=95728

By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K. Becoming a parent is a daunting experience for anyone. The sheer amount of responsibilities can feel overwhelming and all consuming. For my husband and I, we spent an emotional and tiring 18 months working through the adoption process before becoming parents to two fully formed little humans […]

The post How McAfee’s Paternity Leave Helped My New Family appeared first on McAfee Blogs.

]]>

By: Guillaume, EMEA Retail Marketing Manager, Slough, U.K.

Becoming a parent is a daunting experience for anyone. The sheer amount of responsibilities can feel overwhelming and all consuming. For my husband and I, we spent an emotional and tiring 18 months working through the adoption process before becoming parents to two fully formed little humans seemingly overnight. Most parents get to know their children over a few years; we only had two weeks’ worth of introduction. In an instant, these two children and their care, happiness, security, dreams and hopes now rest firmly with us.

I feel incredibly grateful to work for a company that understands the value of family. Whether it was my colleagues checking in and celebrating our new arrivals, or the eight weeks of bonding leave that McAfee offers any new parent – including adoptive and same-sex couples. The paternity leave from McAfee really made a difference in getting to know our children and for them to get to know us. I can’t fathom how different the experience and early months would have been if I had to go back to work after two weeks. The extra time allowed us to get settled and establish good routines.

Overcoming Obstacles

That’s not to say the adoption process was easy. My husband and I knew we wanted to adopt in 2014 but didn’t officially start the process until 2017. After a grueling amount of paperwork came the emotional and time-consuming interview with the social worker. The questions challenged me and forced me to confront some of my own anxieties to ready myself for parenthood. We learned how important it is to be ready and open to re-shape who you are to bring forward the best version of yourself for your children.

 And as a natural worrier, you can imagine how after having children, my anxieties skyrocketed — in addition to the concerns of any new parent, we have to think about protecting our children from homophobic attacks and prejudices. Our boys already had a tough start; I don’t want to make it tougher.

As an LGBTQ+ family, we get unspoken scrutiny from the world that already puts more pressure on us than on conventional families. We know how society says an LGBTQ+ family should celebrate Mother’s Day or Father’s Day. We notice the side looks from other parents. We know how we must conduct ourselves in public to be safe. We know we can’t go on holiday in certain countries.

As a gay man, I’ve had to work hard to create the family I have today. Growing up, gay marriage and adoption weren’t allowed, so I had come to terms with possibly never having a family of my own. Now, I’m able to play football in the park with my kids, tuck them into bed, or help with their homework – just like any other parent. This makes me feel that together, we can make a difference. We can advance equality and make the impossible, possible.

Feeling Included and Supported

I’ve worked for a number of technology companies, but McAfee is the first one that I can say, hand on heart, delivers on its commitment to inclusion. Upon my return, my colleagues have been great at giving me advice and asking how I‘m doing. As an employee and a new father, I couldn’t feel more supported. It’s reassuring to have your company’s backing and I feel lucky to live in an era and country where I could get married and adopt children without discrimination or prejudice.

Allies Can Make a Difference

For me, it’s often the little things that make a big difference toward inclusion and acceptance. Three things I always encourage from allies to help us in our quest for equality, include:

  • Treat people with respect and as your equal (the golden rule – it’s simple and effective!)
  • Have an open mind and don’t be afraid of our differences – we have more in common than you think
  • Call out offensive or disrespectful talk – a simple “hey, that’s not cool” shows those ‘off the cuff’ comments aren’t tolerated

My family is no less different from any other. The worries and hopes for my children are the same as any parent. My struggles and questioning are the same as any father. And the love I feel for my children is the same as everybody else.

Interested in joining our team? We’re hiring! Apply now.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post How McAfee’s Paternity Leave Helped My New Family appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-paternity-leave-helped-my-new-family/feed/ 0
Have Fun in the Sun this Summer with the Summer Safety #RT2Win Sweepstakes! https://securingtomorrow.mcafee.com/consumer/fun-in-the-sun-rt2win-sweepstakes/ https://securingtomorrow.mcafee.com/consumer/fun-in-the-sun-rt2win-sweepstakes/#respond Mon, 10 Jun 2019 18:59:12 +0000 https://securingtomorrow.mcafee.com/?p=95551

The school year has come to an end, and with it comes the start of summer! For many, this time of year brings excitement and anticipation to jet-set off to their favorite destinations and spend some quality time with family. But while many are soaking up the sun or sharing fun photos online, cybercriminals also […]

The post Have Fun in the Sun this Summer with the Summer Safety #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>

The school year has come to an end, and with it comes the start of summer! For many, this time of year brings excitement and anticipation to jet-set off to their favorite destinations and spend some quality time with family. But while many are soaking up the sun or sharing fun photos online, cybercriminals also trying to target those not taking the proper precautions to protect their data.

In fact, according to recent research by McAfee, only 40% of people are concerned about their personal photos being hacked, and 3x more concerned about their Social Security number being hacked than their photos. Whether booking travel deals or sharing photos on social media, device security should be top of mind to keep information secure this summer.

Whether you’re laying by the pool or dipping your toes in the sand, we want to help you leave your cybersecurity woes behind with our Summer Safety #RT2Win sweepstakes! Two [2] lucky winners of the sweepstakes drawing will receive a $500 Amazon gift card. The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, follow @McAfee_Home on Twitter and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Monday, June 10, 2019, at 12:00pm PST. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included in order to be entered.
  • Make sure you’re following @McAfee_Home on Twitter! You must follow for your entry to count.
  • Sweepstakes will end on Sunday, June 23, 2019 at 11:59pm PST. All entries must be made before that date and time.
  • Winners will be notified on Tuesday, June 25, 2019 via Twitter direct message.
  • Limit one entry per person.

1. How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win, AND #Sweepstakes” for a chance to win a $500 Amazon gift card (for full prize details please see “Prizes” section below). Two [2] total winners will be selected and announced on June 25, 2019. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

#RT2Win Sweepstakes Terms and Conditions

2. How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Summer Safety #RT2Win Sweepstakes will be conducted from June 10, 2019 through June 23, 2019. All entries for each day of the McAfee Summer Safety Cybersecurity #RT2Win Sweepstakes must be received during the time allotted for the McAfee Summer Safety #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Summer Safety Shopping #RT2Win Sweepstakes, duration is as follows:

  • Begins: Monday, June 10, 2019­­ at 12:00pm PST
  • Ends: Sunday, June 23, 2019 at 11:59pm PST
  • Two [2] winners will be announced: Tuesday, June 25, 2019

For the McAfee Summer Safety #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Summer Safety #RT2Win Sweepstakes:

  1. Follow @McAfee_Home on Twitter.
  2. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes.
  3. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  4. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  5. Limit one entry per person.

Two [2] winners will be chosen for the McAfee Summer Safety #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Tuesday, June 25, 2019 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.

3. Eligibility: 

McAfee Summer Safety #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Summer Safety #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Summer Safety #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

4. Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Summer Safety #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of two [2] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Summer Safety #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

5. Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by June 25, 2019. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

6. Prizes: 

The prize for the McAfee Summer Safety #RT2Win Sweepstakes is a $500 Amazon gift card for each of the two [2] entrants/winners. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Summer Safety #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Summer Safety #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

Limit one (1) prize per person/household. Prizes are non-transferable, and no cash equivalent or substitution of prize is offered. The McAfee Summer Safety #RT2Win Sweepstakes has no affiliation with Amazon.

7. General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Summer Safety #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Summer Safety #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Summer Safety #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Summer Safety #RT2Win Sweepstakes -related activity, or participation in the McAfee Summer Safety #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

8. Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

9. Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with the prize McAfee Summer Safety #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Summer Safety #RT2Win Sweepstakes.

10. Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Summer Safety #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Summer Safety #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

11. Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of the State of New York, U.S.A.

12. Privacy Policy: 

Personal information obtained in connection with this prize McAfee Summer Safety #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after June 10,2019 before June 23, 2019 to the address listed below, Attn: #RT2Win at Summer Safety Sweepstakes. To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2019 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA
  4. Administrator: LEWIS Pulse, 111 Sutter St., Suiter 850, San Francisco, CA 94104

The post Have Fun in the Sun this Summer with the Summer Safety #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/fun-in-the-sun-rt2win-sweepstakes/feed/ 0
How McAfee’s Mentorship Program Helped Me Shine in My Career Journey https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-mentorship-program-helped-me-shine-in-my-career-journey/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-mentorship-program-helped-me-shine-in-my-career-journey/#respond Wed, 29 May 2019 23:14:49 +0000 https://securingtomorrow.mcafee.com/?p=95425

By: Anshu, Software Engineer “The mind is not a vessel that needs filling, but wood that needs igniting.”—Mestrius Plutarchus A mentor isn’t someone who answers your questions, but someone who helps you ask the right ones. After joining the McAfee WISE mentorship program as a mentee, I understood the essence of these words. WISE is […]

The post How McAfee’s Mentorship Program Helped Me Shine in My Career Journey appeared first on McAfee Blogs.

]]>

By: Anshu, Software Engineer

“The mind is not a vessel that needs filling, but wood that needs igniting.”—Mestrius Plutarchus

A mentor isn’t someone who answers your questions, but someone who helps you ask the right ones. After joining the McAfee WISE mentorship program as a mentee, I understood the essence of these words.

WISE is a community committed to providing opportunities for growth and success, increasing engagement, and empowering women at McAfee. Each year, WISE helps women network and find opportunities for their career development.

Joining the McAfee WISE Mentorship Program

The WISE Mentorship Program was introduced to address how women have been underrepresented in the tech sector, especially in cybersecurity.  It’s believed that mentoring can address and improve job satisfaction and retention, which is how the program found its way to India and I learned about it. As an employee at McAfee for over five years, I had the opportunity to learn a lot of new things, but networking was a skillset I needed to hone. I thought this might be my chance to develop my skills, so I enrolled as a mentee.

I was partnered with “Chandramouli” also known as “Mouli” who happened to be the executive sponsor for the WISE India Chapter, as well as one of our IT leaders.

The Mentor-Mentee Relationship

My sessions with Mouli were informal conversations rather than formal sync-ups. We not only discussed the industry and women in tech—but also our personal stories, the books we read and are inspired by. We discovered a common love for badminton, so we started sharing analogies of how we would handle situations at work compared to game and life scenarios.

And the lessons learned were humbling. You win, you lose, you conquer. This thought shifted my perspective to think about how I would react if it was a badminton match. Would I accept defeat even if the opponent was on game point? Would I play differently even if I knew the match was lost? I realized I would fight and fiercely compete. This simple shift started to make me think on my toes daily.

Like many people, I had a fair idea of how I wanted my career to shape up, but with the help of a mentor, I began to steer faster toward my goal. In just one session, we were able to identify areas that were slowing down my development.

Developing My Skills

We noticed that networking was one of my key improvement areas, so we decided to tackle this with baby steps. He assigned small but achievable tasks to me—tasks as simple as creating a LinkedIn profile and connecting with former and current co-workers.

What happened after that was truly amazing. People from all walks of life in the industry, from my school, college, and more, started connecting with me, and it was then when I realized I had made an impression. Now I find it easier to initiate conversations, knowing that people are ready to help and talk about things we mutually love. As small as these strides might be, they helped me not just move ahead, but also provided me with measurable momentum.

Being able to discuss and question the status quo and engage with someone who is more experienced, knows the art of the game, and is a fierce champion for WISE is something I look forward to every month. Thanks to McAfee for giving each one of us this opportunity to help further our careers and to help us dream big.

Interested in joining our team? We’re hiring! Apply now.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post How McAfee’s Mentorship Program Helped Me Shine in My Career Journey appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-mcafees-mentorship-program-helped-me-shine-in-my-career-journey/feed/ 0
Employees Share Stories Working in Award–Winning Cork Office https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/employees-share-stories-working-in-award-winning-cork-office/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/employees-share-stories-working-in-award-winning-cork-office/#respond Thu, 18 Apr 2019 14:49:10 +0000 https://securingtomorrow.mcafee.com/?p=94919

“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager The McAfee office in Cork was once again named among companies recognized in Ireland’s Great Place to Work awards. Our Cork location has much to offer—from a supportive working environment to career growth opportunities, the opportunities are abundant. Hear from […]

The post Employees Share Stories Working in Award–Winning Cork Office appeared first on McAfee Blogs.

]]>

“The culture at McAfee is easy going, fun, dynamic and everyone is friendly.”—Deirdre, Project Manager

The McAfee office in Cork was once again named among companies recognized in Ireland’s Great Place to Work awards. Our Cork location has much to offer—from a supportive working environment to career growth opportunities, the opportunities are abundant.

Hear from three McAfee employees, Deirdre, Ranjit and Oliver, as they share their personal stories of working in the Cork, Ireland office.

Want to join in on the fun? We’re hiring in Cork! Apply now.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post Employees Share Stories Working in Award–Winning Cork Office appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/employees-share-stories-working-in-award-winning-cork-office/feed/ 0
ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty https://securingtomorrow.mcafee.com/other-blogs/podcast/st03-cloud-technology-trends-with-wayne-anderson-and-dan-flaherty/ https://securingtomorrow.mcafee.com/other-blogs/podcast/st03-cloud-technology-trends-with-wayne-anderson-and-dan-flaherty/#respond Tue, 02 Apr 2019 20:38:15 +0000 https://securingtomorrow.mcafee.com/?p=94827

In this episode, we’ll hear from Wayne Anderson, Enterprise Security Architect at McAfee and Dan Flaherty from the cloud security product team speak on a wide range of topics from upcoming technology trends in the market, to adversarial machine learning, cloud models for security, and a look back at the RSA conference.

The post ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty appeared first on McAfee Blogs.

]]>

In this episode, we’ll hear from Wayne Anderson, Enterprise Security Architect at McAfee and Dan Flaherty from the cloud security product team speak on a wide range of topics from upcoming technology trends in the market, to adversarial machine learning, cloud models for security, and a look back at the RSA conference.

The post ST03: Cloud Technology Trends with Wayne Anderson and Dan Flaherty appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/podcast/st03-cloud-technology-trends-with-wayne-anderson-and-dan-flaherty/feed/ 0
Return to Workplace: Ready to Relaunch Your Career https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/return-to-workplace-ready-to-relaunch-your-career/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/return-to-workplace-ready-to-relaunch-your-career/#comments Thu, 21 Mar 2019 13:58:59 +0000 https://securingtomorrow.mcafee.com/?p=94674

By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time to their families the chance to reignite their passion for the technology industry and relaunch their careers. Sometimes, it’s necessary to put your career on hold to raise kids, care for loved ones or serve […]

The post Return to Workplace: Ready to Relaunch Your Career appeared first on McAfee Blogs.

]]>

By: Sheetal, Application Developer & Majy, IT Support

McAfee offers a new program that offers professionals who dedicated extended time to their families the chance to reignite their passion for the technology industry and relaunch their careers.

Sometimes, it’s necessary to put your career on hold to raise kids, care for loved ones or serve your country. For many, it can be daunting to reenter the workplace after time away. That’s why McAfee designed its Return to Workplace program.

Launched in India in 2018, the 12-week Return to Work program offers training, support and resources for those who are looking to reenter the technology field and put their careers back on track.

Read Sheetal’s and Majy’s stories about how McAfee’s Return to Workplace program helped them build the skills they needed to reenter the workforce and come back strong.

Sheetal’s Return to Workplace Journey – Application Developer

To pursue my love for technology, I moved to Bangalore to complete my engineering degree in computer science, and I found rewarding work as a Quality Auditor. In 2015, I added another momentous title to my resume—mom. I gave birth to my first child and took my maternity leave; however, family circumstances extended my break.

Returning to Tech

Three years later, I was finally ready to get back to work, and I anxiously began my job hunt. It wasn’t as easy as I thought it would be, and I had a few concerns to say the least. Not only did I fear I’d be behind in the fast-paced technology industry, I also feared I wouldn’t find a supportive workplace as a single mom.

All Thanks to McAfee

As a single mother, McAfee allowed me to balance both my career and my family by giving me flexible work hours, technical mentoring, soft skills training, sessions with the HR team and several other resources to sharpen my professional skills. It helped me build my confidence over time, and today, I am working as a part of the application development team, assuring that the business works efficiently as possible.

McAfee has offered not only me, but a number of other wonderful women, a second chance to resume their careers at their own pace, without having to give up time with their families and children.

Majy’s Story – IT Support

Passionate about technology, I pursued my education in engineering at Calicut University and began my career soon after as a software engineer. I loved my career and the people I worked with—it’s what got me out of bed and excited about each day. Eventually, my reasons to start the day shifted when my husband and I were blessed with our first child. I decided it was time to put a hold on my career, to be there for my son and spend quality time at home during those early development years.

Facing Fears About Getting Back to Work

My son was growing up right before my eyes, and as he became more independent, I considered returning to my career. Even though I was eager to get back to work, I feared I wouldn’t find a company that allowed me to manage both a fulfilling career and raising a child at home—or if my skills would still be relevant.

 

Discovering McAfee Was the Best Thing Ever

McAfee’s Return to Workplace initiative completely blew me away. With the working environment that McAfee offered me, which was flexible and encouraging, I absolutely could not miss this opportunity. McAfee offered me several avenues to learn and brush up on my technical skills. They even provided me with a technical mentor! Having access to my mentor created a safe environment where I could ask my technical queries without feeling the pressure of asking the wrong question. In addition to this, the host of online courses I could leverage was an advantage for me. Ultimately, McAfee provided me with an environment where I could learn and grow without feeling intimidated. This was empowering and gave me the push I needed to successfully complete the program. McAfee was my natural first choice for returning to work and I couldn’t have been happier to accept a full-time position.

For more stories like this, follow @LifeAtMcAfee  on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Ready to relaunch your career? Get the resources you need at McAfee. Apply here.

The post Return to Workplace: Ready to Relaunch Your Career appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/return-to-workplace-ready-to-relaunch-your-career/feed/ 2
McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-strike-their-balanceforbetter-pose-this-international-womens-day/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-strike-their-balanceforbetter-pose-this-international-womens-day/#respond Wed, 06 Mar 2019 15:08:44 +0000 https://securingtomorrow.mcafee.com/?p=94403

By Karla, Digital Media Specialist During the month of March, we are thrilled to support International Women’s Day, on March 8, and Women’s History Month. At McAfee, we recognize the importance of an inclusive and diverse culture and as part of this year’s International Women’s Day call to action, we’ve asked team members from across […]

The post McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day appeared first on McAfee Blogs.

]]>

By Karla, Digital Media Specialist

During the month of March, we are thrilled to support International Women’s Day, on March 8, and Women’s History Month. At McAfee, we recognize the importance of an inclusive and diverse culture and as part of this year’s International Women’s Day call to action, we’ve asked team members from across the globe to share how they #BalanceForBetter at McAfee.

Check out some of these great moments and be sure to share your own #BalanceForBetter stories in the comments below!

 

Silvia – Software Sales Account Representative (Chile)

“I always wanted to work for a company that would support me in my role as a woman, a mother, a professional and an athlete. I found that place. McAfee allows me to be me and encourages me to do what I need to do to #BalanceForBetter.”

 

 

 

Priya – Customer Success Manager (India)

“At McAfee, I feel like I can grow my career and be an independent career-focused woman while still being a doting and caring mother and spouse. McAfee helped create the right balance between my family, future and career. #BalanceForBetter”

 

 

 

 

Steve – Head of Advanced Threat Research (U.S.)

“I wish I could say we had gender balance in Advanced Threat Research of 50/50 men and women. I wish we could say this at the industry level in general. However, there’s no time better than the present to change this.

What #BalanceForBetter means to me is engaging early by hosting lab days at McAfee or visiting schools. At McAfee, we have a chance to spark interest, demonstrate inclusiveness and promote real change in the gender gap across the IT industry. Without more women in tech, I truly feel like we are missing out on a unique and diverse perspective. As a father of two young girls with the potential to be anything, I know it’s time we change the status quo.”

 

 

Gurjeet – Engineering Manager (Canada)

“McAfee is like my second family. We celebrate each other’s achievements, encourage one another to give our best and are wonderful friends who always cheer each other up during difficult times.

Here, I can be my personal best every day at the office while doing all the things I cherish with my real family, like hiking, running, traveling and exploring the beautiful world.”

 

 

Paula – Head of Consumer ORD (Brazil)

“The consumer online business is a heavily results-driven organization that demands strong planning and speedy execution, so every minute counts! I #BalanceForBetter by creating clear business objectives that help me to prioritize my tasks and meetings – guaranteeing my weekdays are as productive as possible. This balance ensures that my mornings are spent in the gym and my evenings with family and friends, which ultimately gives me the energy and joy needed to execute my work each day.”

 

 

Laura – Marketing Communications Manager (Mexico)

“After working in marketing for more than 20 years in tech, I certainly believe that technology helps you find a balance of work and play – not having to choose between one or the other. I #BalanceForBetter at McAfee to define the best version of myself.”

 

 

 

Charan Jeet – MSSP Solutions Architect (Australia)

“McAfee’s flexible and supportive work culture plays a vital role. It encourages equal opportunity to every individual/employee irrespective of gender or background. It has helped me keep myself actively engaged in the activities I love, helping me #BalanceForBetter.”

 

 

 

Sonia – Talent Acquisition Partner (Argentina)

“We all live in the same world, but each person lives and experiences life through a different lens. Learning how to accept and sympathize with these different points of view is what makes the world a better place. As a recruiter, I enjoy communicating with diverse people to help them reach their full potential in all aspects of their work lives and personal lives. #BalanceForBetter”

 

 

 

Laura – Program Manager (Ireland)

“At McAfee, we are tipping the scales in terms of championing equality in the workplace. From our investment in gender pay parity to living the McAfee values and creating a better workplace where we are encouraged to be our full authentic selves. For me, that’s #BalanceforBetter.”

 

 

 

 

Andrea – Program Manager (Argentina)

“At McAfee, I #BalanceForBetter by leveraging my skills as a Program Manager to collaborate with teams around the globe. As a working mom at McAfee, I am offered a great work-life balance and I can #BalanceForBetter by devoting time to another one of my passions – playing soccer with my boys! This healthy mix helps me stay happy and well.”

 

 

 

McAfee is an inclusive employer and is proud to support inclusion and diversity. Interested in joining our teams? We’re hiring! Apply now.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

 

The post McAfee Employees Strike Their #BalanceForBetter Pose This International Women’s Day appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-strike-their-balanceforbetter-pose-this-international-womens-day/feed/ 0
Kicking Off MWC 2019 with Insights on Mobile Security and Growing Partnerships https://securingtomorrow.mcafee.com/consumer/mwc-2019-kickoff/ https://securingtomorrow.mcafee.com/consumer/mwc-2019-kickoff/#respond Mon, 25 Feb 2019 08:00:24 +0000 https://securingtomorrow.mcafee.com/?p=94251

We’ve touched down in Barcelona for Mobile World Congress 2019 (MWC), which is looking to stretch the limits of mobile technology with new advancements made possible by the likes of IoT and 5G. This year, we are excited to announce the unveiling of our 2019 Mobile Threat Report, our extended partnership with Samsung to protect […]

The post Kicking Off MWC 2019 with Insights on Mobile Security and Growing Partnerships appeared first on McAfee Blogs.

]]>

We’ve touched down in Barcelona for Mobile World Congress 2019 (MWC), which is looking to stretch the limits of mobile technology with new advancements made possible by the likes of IoT and 5G. This year, we are excited to announce the unveiling of our 2019 Mobile Threat Report, our extended partnership with Samsung to protect Galaxy S10 smartphones, and our strengthened partnership with Türk Telekom to provide a security solution to protect families online.

Mobile Connectivity and the Evolving Threat Landscape

These days, it’s a rare occurrence to enter a home that isn’t utilizing smart technology. Devices like smart TVs, voice assistants, and security cameras make our lives more convenient and connected. However, as consumers adopt this technology into their everyday lives, cybercriminals find new ways to exploit these devices for malicious activity. With an evolving threat landscape, cybercriminals are shifting their tactics in response to changes in the market. As we revealed in our latest Mobile Threat Report, malicious actors look for ways to maximize their profit, primarily through gaining control of trusted IoT devices like voice assistants. There are over 25 million voice assistants in use across the globe and many of these devices are connected to other things like thermostats, door locks, and smart plugs. With this increase in connectivity, cybercriminals have more opportunities to exploit users’ devices for malicious purposes. Additionally, cybercriminals are leveraging users’ reliance on their mobile phones to mine for cryptocurrency without the device owner’s knowledge. According to our Mobile Threat Report, cybersecurity researchers found more than 600 malicious cryptocurrency apps spread across 20 different app stores. In order to protect users during this time of rapid IoT and mobile growth, we here at McAfee are pushing to deliver solutions for relevant, real-world security challenges with the help of our partners.

Growing Partnerships to Protect What Matters

Some cybersecurity challenges we are working to overcome include threats like mobile malware and unsecured Wi-Fi. This year, we’ve extended our long-standing partnership with Samsung to help secure consumers from cyberthreats on Samsung Galaxy S10 smartphones. McAfee is also supporting Samsung Secure Wi-Fi service by providing backend infrastructure to protect consumers from risky Wi-Fi. In addition to mobile, this partnership also expands to help protect Samsung smart TVs, PCs, and laptops.

We’ve also strengthened our partnership with Türk Telekom, Turkey’s largest fixed broadband ISP. Last year, we announced this partnership to deliver cross-device security protection. This year, we’re providing a security solution to help parents protect their family’s digital lives. Powered by McAfee Safe Family, Türk Telekom’s fixed and mobile broadband customers will have the option to benefit from robust parental controls. These controls will allow parents to better manage their children’s online experience and give them greater peace of mind.

We’re excited to see what’s to come for the rest of MWC, and how these announcements will help improve consumers’ digital experiences. It is our hope that by continuing to extend our relationships with technology innovators, we can help champion built-in security across devices and networks.

To stay on top of McAfee’s MWC news and the latest consumer and mobile security threats, be sure to follow @McAfee_Home on Twitter, listen to our podcast Hackable?, and ‘Like’ us on Facebook.

The post Kicking Off MWC 2019 with Insights on Mobile Security and Growing Partnerships appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mwc-2019-kickoff/feed/ 0
McAfee Honors Dr. Martin Luther King Jr. Day https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-honors-dr-martin-luther-king-jr-day/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-honors-dr-martin-luther-king-jr-day/#respond Thu, 17 Jan 2019 18:01:26 +0000 https://securingtomorrow.mcafee.com/?p=93844

On Monday, January 21, McAfee will join millions across the globe to recognize the life and legacy of Dr. Martin Luther King Jr. To honor the achievements of Dr. King, our McAfee African-Heritage Community (MAHC) members recently shared memorable lines from King’s iconic “I Have a Dream” speech that he delivered at the Lincoln Memorial […]

The post McAfee Honors Dr. Martin Luther King Jr. Day appeared first on McAfee Blogs.

]]>

On Monday, January 21, McAfee will join millions across the globe to recognize the life and legacy of Dr. Martin Luther King Jr.

To honor the achievements of Dr. King, our McAfee African-Heritage Community (MAHC) members recently shared memorable lines from King’s iconic “I Have a Dream” speech that he delivered at the Lincoln Memorial on August 28, 1963. The MAHC is an employee-led group that is committed to delivering education, cultural awareness, mentoring programs, community involvement and advancing diversity and inclusion within McAfee’s culture.

Watch the video here:

King shared his important message during the March on Washington for Jobs and Freedom. To provide you with the full meaning and context of King’s powerful speech, you can read the original speech in its entirety here.

McAfee is an inclusive employer and is proud to support inclusion and diversity. Interested in joining our teams? We’re hiring! Apply now.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post McAfee Honors Dr. Martin Luther King Jr. Day appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-honors-dr-martin-luther-king-jr-day/feed/ 0
Preventing Cryptojacking Malware with McAfee WebAdvisor’s New Cryptojacking Blocker https://securingtomorrow.mcafee.com/consumer/webadvisor-cryptojacking-blocker/ https://securingtomorrow.mcafee.com/consumer/webadvisor-cryptojacking-blocker/#respond Wed, 09 Jan 2019 11:00:46 +0000 https://securingtomorrow.mcafee.com/?p=93626

By now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply, cryptocurrencies are virtual currencies that have actual monetary value in today’s world. They are limited entries of transactions into a single database, or public ledger, that can’t be changed without fulfilling certain conditions. These transactions […]

The post Preventing Cryptojacking Malware with McAfee WebAdvisor’s New Cryptojacking Blocker appeared first on McAfee Blogs.

]]>

By now, you’ve probably heard of cryptocurrency, but you may not know exactly what it is. To put it simply, cryptocurrencies are virtual currencies that have actual monetary value in today’s world. They are limited entries of transactions into a single database, or public ledger, that can’t be changed without fulfilling certain conditions. These transactions are verified and added to the public ledger through cryptocurrency mining. Cryptocurrency miners try to make money by compiling these transactions into blocks and solving complicated mathematical problems to compete with other miners for the cryptocurrency. While this process of mining for cryptocurrencies can be lucrative, it requires large amounts of computing power.

Unfortunately, the need for massive amounts of hardware has provoked cybercriminals to participate in cryptojacking, a method of using malware to exploit victims’ computers to mine for cryptocurrencies. Cybercrooks spread cryptojacking malware through sketchy mobile apps, flawed software, and malware-infected ads. They can even cryptojack your device during a browsing session while you’re perusing a website that appears completely harmless. Once a user’s device becomes infected, the malware drains the device’s CPU, causing the user’s computer fan to be loud while the malware mines for cryptocurrencies in the background. Unfortunately, symptoms of cryptojacking are usually pretty subtle, with poor device performance being one of the few signs of its presence.

Thankfully, McAfee WebAdvisor is here to help. This security solution, which helps block users from malware and phishing attempts, now includes Cryptojacking Blocker. This enhancement is a Windows-based browser add-on available for Google Chrome that helps stop malicious websites from mining for cryptocurrency. So far, our direct and retail McAfee WebAdvisor customers have already started receiving the update that adds Cryptojacking Blocker to their product, and the customers who have WebAdvisor through other partners should begin to see this update roll out during Q1. The same thing goes for those who own McAfee LiveSafe and McAfee Total Protection. Additionally, we’re aiming to add support for Firefox in the coming months. And if you don’t already have WebAdvisor, you can download it for free on our website, with Cryptojacking Blocker included in your download.

In addition to using a security solution like McAfee WebAdvisor, here are some other general tips to help you stay safe online:

  • Create a strong, unique password. Although it may be easier to remember, reusing passwords across multiple accounts puts all of your data at risk even if just one of your accounts is breached. Choosing a complex password for each individual online account will act as a stronger first line of defense. You can also use a password manager so all of your credentials are consolidated into one place.
  • Be careful where you click. If you come across a website that seems sketchy or notice that the URL address looks odd, avoid interacting with the site entirely. Stick to browsing websites you know are reputable.
  • Update, update, update! Cybercriminals can take advantage of old software to spread cryptojacking malware. Keeping your software updated with the latest patches and security fixes can help you combat this threat.

And, as always, to stay on top of the latest consumer and mobile security threats, be sure to follow @McAfee_Home on Twitter, listen to our podcast Hackable? and ‘Like’ us on Facebook.

The post Preventing Cryptojacking Malware with McAfee WebAdvisor’s New Cryptojacking Blocker appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/webadvisor-cryptojacking-blocker/feed/ 0
Cash Out with Our CES 2019 #RT2Win Sweepstakes! https://securingtomorrow.mcafee.com/consumer/ces-2019-rt2win-sweepstakes/ https://securingtomorrow.mcafee.com/consumer/ces-2019-rt2win-sweepstakes/#respond Tue, 08 Jan 2019 18:00:20 +0000 https://securingtomorrow.mcafee.com/?p=93634

We’ve officially touched down in Las Vegas for CES 2019! If you aren’t familiar with CES, it is the global stage for innovators to showcase the next generation of consumer technologies. With the growing consumer technology landscape, we understand the importance of creating new solutions for those who want to live their connected lives with […]

The post Cash Out with Our CES 2019 #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>

We’ve officially touched down in Las Vegas for CES 2019!

If you aren’t familiar with CES, it is the global stage for innovators to showcase the next generation of consumer technologies. With the growing consumer technology landscape, we understand the importance of creating new solutions for those who want to live their connected lives with confidence. That’s why we’ve made some exciting new additions to our security lineup and employed multiple partnerships with other innovators like Google and Verizon to help protect users’ online safety. Check out all the details, here.

To celebrate the latest innovations, we’re giving two [2] lucky people the chance to win a $500 Amazon gift card. Not heading to CES this year? No problem! Simply retweet one of our official contest tweets with the required hashtags between January 8th – 11th for your chance to win. Follow the instructions below to enter, and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, follow @McAfee_Home on Twitter and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Tuesday, January 8, 2019 at 8:00 a.m. PT. This tweet will include the hashtags: #McAfeeAtCES, #RT2Win, AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date from your own handle. The #McAfeeAtCES, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Make sure you’re following @McAfee_Home on Twitter! You must follow for your entry to count.
  • Sweepstakes will end on Friday, January 11, 2019 at 11:59 p.m. PST. All entries must be made before that date and time.
  • Winners will be notified on Monday, January 14, 2019 via Twitter direct message.
  • Limit one entry per person.
1. How To Win

Retweet one of our contest tweets on @McAfee_Home that include “#McAfeeAtCES, #RT2Win, AND #Sweepstakes” for a chance to win a $500 Amazon gift card (for full prize details please see “Prizes” section below). Two [2] total winners will be selected and announced on January 14, 2019. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

#RT2Win Sweepstakes Terms and Conditions

2. How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee CES 2019 #RT2Win Sweepstakes will be conducted from January 8, 2019 through January 11, 2019. All entries for each day of the McAfee CES 2019 #RT2Win Sweepstakes must be received during the time allotted for the McAfee CES 2019 #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee CES 2019 #RT2Win Sweepstakes, duration is as follows:

  • Begins: Tuesday, January 8, 2019­­ at 8:00 a.m. PST
  • Ends: Friday, January 11, 2019 at 11:59 p.m. PST
  • Two [2] winners will be announced: Monday, January 14, 2019

For the McAfee CES 2019 #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee CES 2019 #RT2Win Sweepstakes:

  1. Follow @McAfee_Home on Twitter.
  2. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #McAfeeAtCES, #RT2Win and #Sweepstakes.
  3. Retweet the sweepstakes tweet of the day and make sure it includes the #McAfeeAtCES, #RT2Win, and hashtags.
  4. Note: Tweets that do not contain the #McAfeeAtCES, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  5. Limit one entry per person.

Two [2] winners will be chosen for the McAfee CES 2019 #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #McAfeeAtCES, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Monday, January 14, 2019 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

3. Eligibility:

McAfee CES 2019 #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee CES 2019 #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee CES 2019 #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

4. Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee CES 2019 #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of two [2] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee CES 2019 #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

5. Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by January 14, 2019. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

6. Prizes: 

The prize for the McAfee CES 2019 #RT2Win Sweepstakes is a $500 Amazon gift card for each of the two [2] entrants/winners. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee CES 2019 #RT2Win Sweepstakes and all matters or disputes arising from the McAfee CES 2019 #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

Limit one (1) prize per person/household. Prizes are non-transferable, and no cash equivalent or substitution of prize is offered. The McAfee CES 2019 #RT2Win Sweepstakes has no affiliation with Amazon.

7. General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee CES 2019 #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee CES 2019 #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee CES 2019 #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee CES 2019 #RT2Win Sweepstakes -related activity, or participation in the McAfee CES 2019 #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

8. Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  • To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  • Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.
9. Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with the prize McAfee CES 2019 #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee CES 2019 #RT2Win Sweepstakes.

10. Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee CES 2019 #RT2Win Sweepstakes and all matters or disputes arising from the McAfee CES 2019 #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

11. Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of the State of New York, U.S.A.

12. Privacy Policy: 

Personal information obtained in connection with this prize McAfee CES 2019 #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after January 8, 2019 before January 11, 2019 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2019 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA
  4. Administrator: LEWIS Pulse, 111 Sutter St., Suiter 850, San Francisco, CA 94104

The post Cash Out with Our CES 2019 #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/ces-2019-rt2win-sweepstakes/feed/ 0
Kicking off CES 2019 with New Security Solutions and Collaborations https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/ces-2019-kickoff/ https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/ces-2019-kickoff/#respond Mon, 07 Jan 2019 11:00:08 +0000 https://securingtomorrow.mcafee.com/?p=93580

Today, we at McAfee are announcing some exciting new security solutions and integrations at CES in Las Vegas. For those of you who are unfamiliar with CES, it is the global stage for innovators to showcase the next generation of consumer technologies. McAfee now delivers protection to more than 500 million customers worldwide, and we […]

The post Kicking off CES 2019 with New Security Solutions and Collaborations appeared first on McAfee Blogs.

]]>

Today, we at McAfee are announcing some exciting new security solutions and integrations at CES in Las Vegas. For those of you who are unfamiliar with CES, it is the global stage for innovators to showcase the next generation of consumer technologies. McAfee now delivers protection to more than 500 million customers worldwide, and we understand the importance of creating new solutions for those who want to live their connected lives with confidence. To help empower our customers to do this, we’ve added to our security lineup and are working with other tech innovators who understand the importance of protecting users’ online safety.

One addition to our lineup of security solutions is McAfee Gamer Security. In a recent gaming survey, we discovered that 75% of gamers are worried about the security of gaming as online threats continue to rise. To help combat these threats, we developed McAfee Gamer Security, which protects gamers while optimizing their gaming experience. Some of the product’s key features include Game Mode, a gamer-centric interface, and minimal security resource consumption. These features help optimize gamers’ computing resources, provide system status updates, and equip users with lightweight security protection.

In addition to our latest product advancements, we’ve also teamed up with other companies looking to better the cybersecurity landscape for consumers. The first is Google. In order to further simplify the process of securing today’s connected home, McAfee will provide McAfee Secure Home Platform voice commands for the Google Assistant. McAfee Secure Home Platform provides an extra layer of security to help automatically protect all of the connected devices on the user’s home network. Soon, Google Assistant users can easily manage their connected home security by just using their voice.

While it’s important to secure the connected home, it is also important to protect your mobile and IoT devices as well. According to McAfee Labs 2019 predictions, cybercriminals will leverage trusted devices like smartphones and tablets to try and access users’ IoT devices in the upcoming year. To help customers stay safeguarded from this threat, we’ve teamed up with Verizon to protect their home networks through Verizon Home Network Protection. This McAfee-powered solution helps Verizon Fios customers stay secured against malicious websites, provide parental controls, and protect all devices connected to their home network.

Furthermore, we at McAfee and Dell have teamed up to protect consumers and small businesses as they enjoy the benefits of today’s technology. To do this, we’ve expanded our collaboration to provide pre-installed McAfee software on PCs and laptops globally to both consumer and small business customers. Customers who purchase a new laptop or PC will also have the option to extend McAfee protection beyond their Dell device to their smartphones and tablets. This allows users to have a more robust security shield around all of their connected devices, creating a safer overall online experience. Dell consumer and small business customers who purchase Dell Inspiron, XPS, Vostro, and G-Series laptops will receive a 30-day or 1-year subscription. Customers who purchase Alienware, OptiPlex, Latitude, and Precision will have the option of adding a 30-day free subscription or purchasing a 1-year subscription.

Another one of our latest innovations is the addition of Cryptojacking Blocker to McAfee WebAdvisor. As we observed in our latest McAfee Labs report, coin mining malware is on the rise, growing more than  4000% in the last year. Cryptojacking Blocker helps protect users from having their devices hijacked without their knowledge or permission. The tool helps prevents websites from mining for cryptocurrency and is included in all McAfee suites that include McAfee WebAdvisor. Users can update their existing WebAdvisor software to get Cryptojacking Blocker or download WebAdvisor for free.

So far, CES 2019 has proven that innovation will continue to evolve, just as the cybersecurity landscape will continue to mature. By working together to improve the technology that protects connected devices, we can help users optimize their digital life without compromising their online safety.

To stay on top of McAfee’s CES news and the latest consumer and mobile security threats, be sure to follow @McAfee_Home on Twitter, listen to our podcast Hackable?, and ‘Like’ us on Facebook.

The post Kicking off CES 2019 with New Security Solutions and Collaborations appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/ces-2019-kickoff/feed/ 0
Why I Bring My Authentic Self to Work at McAfee https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/why-i-bring-my-authentic-self-to-work-at-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/why-i-bring-my-authentic-self-to-work-at-mcafee/#respond Fri, 14 Dec 2018 17:16:44 +0000 https://securingtomorrow.mcafee.com/?p=93119

By Kristol, Sales Account Manager and President, McAfee African Heritage Community If you talked to me when I first started working at McAfee, I wouldn’t have believed you if you told me that I’d still be working here 16 years later. But I am still working here, and I’ve grown from every challenge and success […]

The post Why I Bring My Authentic Self to Work at McAfee appeared first on McAfee Blogs.

]]>

By Kristol, Sales Account Manager and President, McAfee African Heritage Community

If you talked to me when I first started working at McAfee, I wouldn’t have believed you if you told me that I’d still be working here 16 years later. But I am still working here, and I’ve grown from every challenge and success in my cybersecurity journey. Most of all, I’m thankful to work for an employee-first company.

When I walk through our Plano office doors, it’s like walking into my second home. At my desk, I even have my own as-seen-on-TV “Snuggie” blanket in case I get cold while I’m working.

Early in my career at McAfee, I formed an immediate bond with my new teammates in operations. It was clear to me that they would soon become family. Over the years, we have shared milestones, marriages, births, and burials. And as I’ve moved role to role internally at McAfee, I’ve noticed a trend: these wonderful working relationships have continued. My experience has remained consistent as I’ve moved between departments: from operations to finance and sales.

During my tenure, I have experienced a transition from a married woman with a five-year-old daughter and three-year-old son, to a divorcée who is approaching an “empty nesting” season of life. My transition has brought challenging personal experiences—and McAfee was the only constant in my life. Work/life balance as a single mother was critical to my personal and professional success. McAfee’s leadership approach has always been sensitive—not only to what’s best for the bottom line, but what’s best for the employee.

 

Culture and Office Camaraderie

One of my favorite parts about working at McAfee is the fun culture! In the last 16 years, I have had seven different roles—each with new challenges and skillsets to prepare me for the next level. It has been one adventurous ride—from recording a sales kick-off video meeting, to dress-up shenanigans, to singing “Proud Mary” at a Christmas event (and winning!).

10 years ago, I started a Holiday Candle Exchange party with the women here in our Plano office.  My goal was to put names to faces, network with other women at McAfee and of course, get a great candle for the season! The event started with four to six women and has grown to over 20 women annually. This is one of McAfee’s best attributes, the ability to innovate without fear and cultivate an inclusive culture—right where you are!

Becoming a Leader in the African Heritage Community

In 2017, I proudly accepted the appointment to become the President of the African Heritage Community, one of our diversity and inclusion chapters at McAfee. It’s been an honor to be a part of an organization that celebrates diversity while fostering inclusion and professional growth. The MAHC chapter is led by talented individuals from different business units across the company—like human resources, training, support, and operations.

Our organization is focused on staying connected, cultivating our organization, and committed to professional and personal growth—while centering ourselves within the community.

How McAfee Has Supported My Development

I have truly been blessed to be an employee at McAfee. I work with teammates, managers, and executives that push me to be a better version of myself every single day. They challenge my way of thinking and motivate me to look beyond the present. To prepare for unknown surprises. To accept defeat and learn from it. To be confident in my decisions and trust myself. To never stop learning, believing and dreaming!

This is my life at McAfee…and it’s a wonderful life!

 

 

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about. Interested in joining our teams? We’re hiring! Apply now!

The post Why I Bring My Authentic Self to Work at McAfee appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/why-i-bring-my-authentic-self-to-work-at-mcafee/feed/ 0
Stay Secure and Your Wallet Full with Our Holiday Shopping #RT2Win Sweepstakes! https://securingtomorrow.mcafee.com/consumer/holiday-shopping-rt2win-2018/ https://securingtomorrow.mcafee.com/consumer/holiday-shopping-rt2win-2018/#respond Mon, 26 Nov 2018 20:00:36 +0000 https://securingtomorrow.mcafee.com/?p=92823

Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time of year for e-commerce, this year we conducted the Stressed Holiday Online Shopping survey to understand how financial pressure can impact buyer behavior when it comes to online purchasing and cybersecurity. The economic burden of the […]

The post Stay Secure and Your Wallet Full with Our Holiday Shopping #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>

Black Friday and Cyber Monday mark the unofficial kickoff to the holiday shopping season. In anticipation of the busiest time of year for e-commerce, this year we conducted the Stressed Holiday Online Shopping survey to understand how financial pressure can impact buyer behavior when it comes to online purchasing and cybersecurity.

The economic burden of the holidays is something consumers know all too well. From gifts for the family to parties with friends, it’s no wonder that 79 percent of survey respondents said that holiday shopping puts financial stress on them. And the stress of stretching that budget lead 53 percent of respondents to say they can to be careless when online shopping. Further, more than half of consumers (56 percent) said that they would use a website they were unfamiliar with if it meant they would save money.

But just in time for holiday shopping season, we’re here to help take the financial burden off your shoulders with our Holiday Shopping RT2Win Sweepstakes! Two [2] lucky winners of the sweepstakes drawing will receive a $500 Amazon gift card. The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, follow @McAfee_Home on Twitter and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Monday, November 26, 2018, 2018 at 12:00pm PT. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Make sure you’re following @McAfee_Home on Twitter! You must follow for your entry to count.
  • Sweepstakes will end on Sunday, December 9, 2018 at 11:59pm PT. All entries must be made before that date and time.
  • Winners will be notified on Tuesday, December 11, 2018 via Twitter direct message.
  • Limit one entry per person.
1. How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win, AND #Sweepstakes” for a chance to win a $500 Amazon gift card (for full prize details please see “Prizes” section below). Two [2] total winners will be selected and announced on December 10, 2018. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

#RT2Win Sweepstakes Terms and Conditions

2. How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Holiday Shopping #RT2Win Sweepstakes will be conducted from November 26, 2018 through December 9, 2018. All entries for each day of the McAfee Holiday Shopping #RT2Win Sweepstakes must be received during the time allotted for the McAfee Holiday Shopping #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Holiday Shopping #RT2Win Sweepstakes, duration is as follows:

  • Begins: Monday, November 26, 2018­­ at 12:00pm PST
  • Ends: Sunday, December 9, 2018 at 11:59pm PST
  • Two [2] winners will be announced: Tuesday, December 11, 2018

For the McAfee Holiday Shopping #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Holiday Shopping #RT2Win Sweepstakes:

  1. Follow @McAfee_Home on Twitter.
  2. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes.
  3. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  4. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  5. Limit one entry per person.

Two [2] winners will be chosen for the McAfee Holiday Shopping #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Tuesday, December 11, 2018 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

3. Eligibility: 

McAfee Holiday Shopping #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Holiday Shopping #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Holiday Shopping #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible. 

4. Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Holiday Shopping #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of two [2] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Holiday Shopping #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

5. Winner Notification:  

Each winner will be notified via direct message (“DM”) on Twitter.com by December 11, 2018. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty-four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

6. Prizes: 

The prize for the McAfee Holiday Shopping #RT2Win Sweepstakes is a $500 Amazon gift card for each of the two [2] entrants/winners. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Holiday Shopping #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Holiday Shopping #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

Limit one (1) prize per person/household. Prizes are non-transferable, and no cash equivalent or substitution of prize is offered. The McAfee Holiday Shopping #RT2Win Sweepstakes has no affiliation with Amazon.

7. General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Holiday Shopping #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Holiday Shopping #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Holiday Shopping #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Holiday Shopping #RT2Win Sweepstakes-related activity, or participation in the McAfee Holiday Shopping #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

8. Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  • To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  • Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.
9. Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with the prize McAfee Holiday Shopping #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Holiday Shopping #RT2Win Sweepstakes.

10. Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Holiday Shopping #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Holiday Shopping #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

11. Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with these sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of the State of New York, U.S.A.

12. Privacy Policy: 

Personal information obtained in connection with this prize McAfee Holiday Shopping #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after November 26, 2018 before December 9, 2018, to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA
  4. Administrator: LEWIS Pulse, 111 Sutter St., Suite 850, San Francisco, CA 94104

The post Stay Secure and Your Wallet Full with Our Holiday Shopping #RT2Win Sweepstakes! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/holiday-shopping-rt2win-2018/feed/ 0
McAfee Explorers: From Student to Teacher https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-explorers-from-student-to-teacher/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-explorers-from-student-to-teacher/#respond Wed, 07 Nov 2018 23:22:16 +0000 https://securingtomorrow.mcafee.com/?p=92551

Ahmad, Software Architect Hailing from a small town in India, school for me was largely a means to an end. Rather than a chance to explore and cultivate my own interest, education was a path to a degree that could be used to obtain a steady and respectable career. Throughout my childhood, however, I was […]

The post McAfee Explorers: From Student to Teacher appeared first on McAfee Blogs.

]]>

Ahmad, Software Architect

Hailing from a small town in India, school for me was largely a means to an end. Rather than a chance to explore and cultivate my own interest, education was a path to a degree that could be used to obtain a steady and respectable career. Throughout my childhood, however, I was a curious boy; I was always intrigued in science and fascinated by technology. My curiosity often had me taking apart my toys, attempting to understand how they worked instead of playing with the toy itself. My inquisitive nature produced boundless questions, yet there were few resources available to satisfy my young mind and its insatiable appetite for information.

A Call to Adventure

When I first learned of McAfee Explorers, I knew I had to get involved! McAfee Explorers is an on-demand, job shadowing and career guidance program for children of McAfee employees and soon, the larger community. Children ages 11-18 can come into a McAfee office and be paired with an Explorer Host (a trained McAfee employee) for job shadowing experience—bringing to life the ideas and interest of each participant.

This opportunity brought back memories of a younger me, hungry for knowledge and education. It made me think about how much I could have benefited from a program like McAfee Explorers as a youth. Not only was I excited to share my own experiences and expertise, I was looking forward to learning and observing how future generations approach learning and how they tend to their own growing minds.

Explore Your World with a Brand-new Map

Drawing on my own childhood experiences, I have been mindful to find ways of relating my work to the children participating in ways they could understand and find interesting. As we know, tech jargon about algorithms, data structures and programming languages can come off dry. McAfee Explorers has challenged me to present these topics in ways that describe how integral each function is to the holistic mission of our company. The program has pulled me out of my proverbial day-to-day role and has given me a reinvigorated sense of purpose and contribution.

Working with the children has been an absolute blast! Explorer kids are sharp, keen observers and teach me that solutions to our biggest problems don’t always require complex thinking from the most learned minds. Answers can stem from asking small questions on fundamentals. The participants are eager to learn with every new topic, engaging the hosts on a new level with their out-of-the-box questions. There is a vibrant chemistry between participants and hosts alike, which makes for a truly enriching experience for everyone!

Mahatma Gandhi once said, “A teacher who establishes rapport with the taught becomes one with them and learns more from them than he teaches them.”[1] And I believe that this perfectly reflects the spirit of McAfee Explorers.

Together for Good

I firmly believe that sharing knowledge and experiences is how we can all impact our society for the better. Margaret Fuller said, “If you have the knowledge, let others light their candles with it.” [2]

I am very grateful that McAfee provides this career opportunity. I take great pride in working for a company that empowers its employees to take an active role in their communities. McAfee Explorers has allowed me to connect with my past and use the tools I have today to create a space for young minds to explore and flourish. This program is very meaningful to me—and I plan to stay involved as it continues to grow.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

[1] Mahatma Gandhi https://www.azquotes.com/quote/548250

[2] Margaret Fuller https://www.margaretfuller.org/index.php?option=com_content&view=article&id=90:sermon-award-winner&catid=40&Itemid=82

The post McAfee Explorers: From Student to Teacher appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-explorers-from-student-to-teacher/feed/ 0
How I Thrive in Technology at McAfee https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-thrive-in-technology-at-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-thrive-in-technology-at-mcafee/#respond Tue, 06 Nov 2018 22:59:21 +0000 https://securingtomorrow.mcafee.com/?p=92531

By: Hannah, Software Quality Assurance Engineer I joined the McAfee Quality Assurance team at the Brighton office earlier this year. It was immediately obvious that the company is determined to encourage more women into technology roles. At McAfee, I have a voice, I’m heard, and my skills, experience and capabilities are valued and taken seriously. My […]

The post How I Thrive in Technology at McAfee appeared first on McAfee Blogs.

]]>

By: Hannah, Software Quality Assurance Engineer

I joined the McAfee Quality Assurance team at the Brighton office earlier this year. It was immediately obvious that the company is determined to encourage more women into technology roles.

At McAfee, I have a voice, I’m heard, and my skills, experience and capabilities are valued and taken seriously. My team is warm and friendly, as well as having a fierce desire to produce the best work we possibly can, working together. Approachability and transparency are key to the company culture. It’s a real breath of fresh air!

5 Ways to Thrive

The McAfee culture presents women considering moving to technology roles with great opportunities. Here are my top 5 tips to make the most of the opportunity, based on my experience here.

1. Make the Most of Your Uniqueness

Don’t focus on how few women there are in your team, the company or the industry. Concentrate on what you can contribute. You are unique. No one else, woman or man, can be to your team what you can. Make the most of you!

2. Be the Wise Fool

Wise fools ask the questions that need to be asked, even if others may think they are foolish. It’s often those very questions that unblock a project, move it forward, uncover vital insights and open new possibilities. I quickly discovered that when I ask questions, I’m a lot more effective and successful.

3. Get a Mentor; Be a Mentor

I can’t over-state the importance of mentoring. Find the right mentor! Mentors bring a different perspective to your challenges, opportunities, and how you are perceived in the team, as well as expanding your knowledge, skills and understanding.

On the flip-side, being a mentor, as well as offering all this to your mentee, will also help you broaden your perspectives and improve your communication skills. Pay it forward!

4. Don’t Underestimate Yourself

Let me emphasize this, it’s so important! Never underestimate yourself. Be confident. Own your knowledge, experience, skills and capabilities. Seize every opportunity to use them.

Confidence builds confidence. As you step out, you’ll discover that you can do and achieve things you never thought possible, and your confidence, and your team’s confidence in you, will grow.

5. Go For It

Don’t hold back. Don’t put things off. Step out, experiment and float ideas. Speak up and speak out. Treat your peers as equals. Expect to be taken seriously – at McAfee you will be. You can do amazing things, so get out there and do them!

The McAfee slogan is right on: together is power!

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

The post How I Thrive in Technology at McAfee appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-thrive-in-technology-at-mcafee/feed/ 0
Returning to Work? Make it McAfee! https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/returning-to-work-make-it-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/returning-to-work-make-it-mcafee/#respond Tue, 30 Oct 2018 19:20:43 +0000 https://securingtomorrow.mcafee.com/?p=92303

By: Vera, Software Developer After nine years out of the workplace, I was ready to return to software development. The idea was challenging at first. Would my skills still be valued? Which company would be right for me? To prepare, I attended seminars and technology deep-dives for people looking to return to software development work. […]

The post Returning to Work? Make it McAfee! appeared first on McAfee Blogs.

]]>

By: Vera, Software Developer

After nine years out of the workplace, I was ready to return to software development. The idea was challenging at first. Would my skills still be valued? Which company would be right for me?

To prepare, I attended seminars and technology deep-dives for people looking to return to software development work. McAfee offered a 12-week, full-time, compensation-based experience program which I was delighted to accept. Designed to help people successfully re-integrate into the workplace after time away, it’s part of McAfee’s strategy to help fill the cybersecurity skills gap and encourage diversity in the technology sector.

Everyone I spoke with at McAfee impressed me as they shared their roles and experiences with the company. I really liked the support, guidance and resources McAfee offered applicants—it gave me the confidence I needed to step back into work. It was clear McAfee would be the perfect starting point for me, my natural first choice when returning to work.

Part of the Team and Learning Fast

Joining McAfee’s Web Security Research software development group in Cork, Ireland, I felt welcome and part of the team from Day One. The culture is inclusive and welcoming, with creativity and new ideas welcomed.

Nine years out of practice and with experience in Java-based software, but none in cybersecurity, I had much to learn. I loved the way everyone in my team was always ready to help and support me.

The team uses the scrum development approach, members collaborating extensively on tasks in two-week sprints. We also use pair programming, working on tasks in pairs.

Scrum and pair programming were both new to me, but I quickly gained a comprehensive understanding of the technologies, techniques and tools as we bounced ideas off one another and addressed challenges together. It was great to develop skills and re-integrate with the workplace so rapidly.

I learned not only about security and McAfee’s solutions, but also about the Linux platforms they run on. I hadn’t done any Unix work since my graduate days, but the team provided support and advice whenever I needed it.

Make the Most of Your Placement

I’d recommend McAfee to anyone looking to return to the workplace. The company has been a great employer and a fantastic way to restart my career. Here are my top five tips for getting the most out of returning to work.

1. Do Your Homework
It’s important to find the right fit for you and your skills. Speak to team members to discover what the company is like, and the products, processes and technologies you’ll be working with.

2. Go Ahead – Apply!
Believe in yourself. You’ve had a good career and responsibilities in the past and your knowledge hasn’t evaporated. You can do even more in the future—I can attest to that. Wherever your next opportunity is, make sure it’s the perfect place to acquire skills and knowledge you may have missed during your time away.

3. Build Your Skills
Expand your expertise through Return to Work seminars and other resources. Review current technologies and thinking. Expand your capabilities and confidence!

4. Extend Your Network
Before and during your time at your placement company, develop connections with relevant people in your team, and in the industry as a whole.

5. Ask Questions
McAfee operates from a foundation of trust and respect. Questions get answers that support progress and development. If you don’t know, ask, either in your team or in your personal development sessions, an integral part of the program.

If you’re apprehensive, don’t worry – that’s normal! I was unsure when I first considered returning to work, especially after such a long break, but now I’m delighted to be back, and even more so to be working with McAfee in a permanent, full-time role.

It’s great to be part of a company that recognizes the capabilities of people who took time out of the workplace, investing time and resources to help us get that all-important foot back in the door. I didn’t know I could do it – now I know I can!

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in learning more about a career at McAfee? Apply here!

The post Returning to Work? Make it McAfee! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/returning-to-work-make-it-mcafee/feed/ 0
How the McAfee Rotation Program is Providing Opportunities https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-the-mcafee-rotation-program-is-providing-opportunities/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-the-mcafee-rotation-program-is-providing-opportunities/#comments Wed, 10 Oct 2018 20:13:32 +0000 https://securingtomorrow.mcafee.com/?p=91864

 By: Darius, Sales & Marketing Rotation Engineer “The sky is the limit.” It’s a phrase I heard frequently growing up, in school, college and university. To me, the phrase means there are endless opportunities. So, my nine-year-old self desired to be a racecar driver, my freshman year ambition was to be a developer and then […]

The post How the McAfee Rotation Program is Providing Opportunities appeared first on McAfee Blogs.

]]>

 By: Darius, Sales & Marketing Rotation Engineer

“The sky is the limit.” It’s a phrase I heard frequently growing up, in school, college and university. To me, the phrase means there are endless opportunities. So, my nine-year-old self desired to be a racecar driver, my freshman year ambition was to be a developer and then my “final” plan was to work in power transmission/distribution or renewable energy.

After graduation, with all these possibilities, I still didn’t really have a clear picture of what I wanted to do. I focused on volunteering and earning great grades in school, but like many of my peers, I hadn’t really prepared for life after college. I hadn’t thought seriously enough about my career path.

What I did know was this: I wanted to use my technical skills while at the same time learn the business side of an industry. It was my broad interest that led me to the McAfee Rotation Program (MRP) in the summer of 2017.

Wide-ranging Experience

The MRP is perfect for anyone who is attracted to the cybersecurity industry but wants experience in a range of business units. I’m gaining extensive knowledge of cybersecurity products and services, developing my technical and business acumen, building communication skills and expanding my network.

The MRP consist of five four-month placements known as “rotations.” This includes our Professional Services, Pre-Sales Engineering, the Security Operations Center, Support and Sales Operations units.

During the first three of my five rotations, I’ve had the opportunity to build my brand, learn McAfee values and business strategies, make a real impact on the departments I’ve worked with and learn from outstanding mentors.

No Fear!

We innovate without fear—this is an important McAfee value. The MRP gave me several opportunities to become a trailblazer and make a real impact with fresh ideas.

During my first rotation in Professional Services, I helped to accelerate the sales cycle with a new opportunity tracking system that included weekly reports. My line management and I could see an instant difference with the new system, which was most satisfying. I am grateful to work for a company that encourages innovation and creative thinking.

Rapid Learning

In my second rotation with Pre-Sales Engineering, I took on detailed product knowledge in multiple solutions through the projects I worked on in my day-to-day job experience.

With mentorship from senior sales engineers, I put my new knowledge and understanding to the test when I demonstrated McAfee’s Endpoint Security and Threat Intelligence Exchange solutions to a customer. This also gave me the chance to work with technical and commercial departments simultaneously.

My rapid acquisition of knowledge, understanding and experience continued in my third rotation with our Security Operations Center (SOC). In the SOC, I have learned first-hand how vital security is and gained a broad spread of new skills and knowledge, applicable across all business units.

Opportunities Abound

The MRP has created opportunities that I could never have imagined. “The sky is the limit” has taken on a whole new meaning for me.

During my first year at McAfee, I have grown professionally, become a more well-rounded individual and experienced more about business operations than many people do throughout their entire career. I can’t recommend the McAfee Rotation Program enough. It’s given me confidence that I can achieve great things—but I’m also honing in on what I want to do with my career and where my skills are best suited. I can’t wait to see what the next two rotations bring!

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in the McAfee Rotation Program? Find out more here.

The post How the McAfee Rotation Program is Providing Opportunities appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-the-mcafee-rotation-program-is-providing-opportunities/feed/ 1
Announcing McAfee’s Evolved Consumer Product Portfolio https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/mcafee-consumer-portfolio-2018/ https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/mcafee-consumer-portfolio-2018/#respond Thu, 20 Sep 2018 23:31:31 +0000 https://securingtomorrow.mcafee.com/?p=91616 Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, […]

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.

]]>
Every fall the leaves change colors, sweaters replace sundresses, and new changes are afoot. Especially for us at McAfee. In fact, we’re announcing quite a few changes to our consumer security portfolio this fall. Tailored to the increasingly connected world we live in, our evolved line of products focuses on better performance, better ransomware protection, and a holistic approach to securing every facet of a connected consumer’s life. Curious how exactly our lineup does that? Allow us to break it down.

First, there are a few key product updates. In exciting news, McAfee Identity Theft Protection and McAfee Safe Family are now both included in McAfee Total Protection and McAfee LiveSafe. Additionally, McAfee Ransom Guard and PC Boost have been added to the entire product lineup, which includes McAfee AntiVirus, McAfee AntiVirus Plus, and McAfee Internet Security. Now, let’s get into a few specifics about product performance.

Improved Performance

McAfee’s core lineup of products now sends malware analysis to the McAfee Global Threat Intelligence (GTI) cloud, which means fewer system resources are required, and PCs can work at optimal speeds. Beyond that, we’ve also implemented a few key PC enhancements, including:

  • McAfee App Boost – Helps resource-hungry apps complete tasks more quickly by automatically allocating more resources to applications the customer is actively using.
  • McAfee Web Boost – Prevents unwanted or unrequested downloads and system activity caused by auto-play videos resulting in reduced bandwidth and resource consumption.

There are a few notable mobile enhancements as well, which include:

  • McAfee Mobile Security – Fully redesigned to deliver a more intuitive and engaging user experience.
  • McAfee Mobile Security for Android – Now includes machine learning capabilities within the mobile AV engine, which provides more efficient scanning and faster malware detection.
  • McAfee Mobile Security for iOS – New Wi-Fi Threat Scan shows the security status of the connected Wi-Fi network and alerts users if the Wi-Fi network they are connected to is at risk.

Increased Ransomware Protection

Ransomware attacks have shown no signs of slowing, which is why last year McAfee introduced a machine learning-based anti-virus engine with Real Protect to protect consumers from modern-day threats. And now we’ve updated our features to continue the fight against these advanced attacks. New features include:

  • McAfee Ransom Guard – Adds another layer of protection on the PC which monitors for suspicious file changes, warns the user when ransomware may be at work and suggests recommended actions for remediation. Additionally, this technology allows McAfee to detect many variants of zero-day ransomware.
  • Virus Protection Pledge – This year’s lineup extends the guarantee to six additional languages. If a customer enrolled in automatic renewal gets a virus with protection turned on, the customer support team will remove it, or the customer will receive a refund.

Protecting People’s Digital Lives

As people become more and more connected in the modern digital era, they’re in need of protection in every part of their online life. That’s why McAfee’s new lineup now includes features that make it easier than ever to protect what matters most. This includes:

  • McAfee Safe Family – Provides parents the visibility and controls needed to keep their children safer online when they use their PCs, smartphones, and tablets.
    • Key features and benefits include: Activity reports, app and web blocking capabilities, screen time controls, location tracking, 1-click digital time-outs and more. McAfee Safe Family Premium is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.
  • McAfee Identity Theft Protection – Allows users to take a proactive approach to protecting their identities.
    • Key features and benefits include: Cyber monitoring, Social security number trace, credit monitoring, 24/7 agency support, and ID recovery and stolen funds reimbursement. McAfee Identity Theft Protection Essentials is included with subscriptions to McAfee Total Protection 10 and McAfee LiveSafe.

So, whether you’re focused on fighting back against ransomware, or ensuring all your online interactions are protected from threats, our evolved portfolio of products is here to ensure you can live your connected life with confidence. Make sure you get proactive about your personal protection now.

To learn more about consumer security and our approach to it, be sure to follow us at @McAfee and @McAfee_Home.

The post Announcing McAfee’s Evolved Consumer Product Portfolio appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/mcafee-consumer-portfolio-2018/feed/ 0
Back-to-School Cybersecurity 101: #RT2Win an A+ Worthy Prize https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win/ https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win/#respond Mon, 27 Aug 2018 19:00:30 +0000 https://securingtomorrow.mcafee.com/?p=91250 The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming to an end, and parents and kids are switching gears from hot afternoons filled with play dates and summer camp to early mornings and long school days. But as fun as a new school year […]

The post Back-to-School Cybersecurity 101: #RT2Win an A+ Worthy Prize appeared first on McAfee Blogs.

]]>
The days are getting shorter and your bags are (finally) unpacked from the annual family vacation. Summer is officially coming to an end, and parents and kids are switching gears from hot afternoons filled with play dates and summer camp to early mornings and long school days. But as fun as a new school year may be, did you know there have been 353 cybersecurity incidents U.S. K-12 public schools and districts since January 2016? And with devices being the new norm in the classroom – and the increasing number of phishing scams, ransomware and data breaches – cybersecurity should be the first priority when sending your kids back to school.

Backpacks, notebooks, pencils, markers…. the supplies list seems to go on and on. And we know that making sure your kids’ devices are secure can be stressful enough without the pressures of back-to-school supplies shopping, so we’re here to make sure they head back to school in style with our A+ worthy RT2Win sweepstakes!

Three [3] lucky winners of the sweepstakes drawing will receive a McAfee Back-to-School Essential Backpack complete with essential school supplies like binders, notebooks, book covers, $100 Amazon gift card, Fujifilm Instanx Mini 7s, and so much more! ($300 value, full details below) The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Monday, August 27, 2018, 2018 at 12:00pm PT. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Sweepstakes will end on Monday, September 10, 2018 at 11:59pm PT. All entries must be made before that date and time.
  • Winners will be notified on Monday, September 12, 2018 via Twitter direct message.
  • Limit one entry per person.

1. How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win AND #Sweepstakes” for a chance to win a McAfee Back-to-School Essential Backpack (for full prize details please see “Prizes” section below). Three [3] total winners will be selected and announced on September 10, 2018. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

#RT2Win Sweepstakes Terms and Conditions

2. How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Back-to-School #RT2Win Sweepstakes will be conducted from August 27, 2018 through September 10, 2018. All entries for each day of the McAfee Back-to-School #RT2Win Sweepstakes must be received during the time allotted for the McAfee Back-to-School #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Back-to-School #RT2Win Sweepstakes, duration is as follows:

  • Begins Monday, August 27­­ at 12:00pm PST
  • Ends: Monday, September 10, 2018 at 11:59pm PST
  • Three [3] winners will be announced: Wednesday, September 12, 2018

For the McAfee Back-to-School #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Back-to-School Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes
  2. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  3. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  4. Limit one entry per person.

Three [3] winners will be chosen for the McAfee Back-to-School #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Wednesday, September 12, 2018 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

3. Eligibility: 

McAfee Back-to-School #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Back-to-School #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Back-to-School #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

 4. Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Back-to-School #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of three [3] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Back-to-School #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

5. Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by September 12, 2018. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

6. Prizes: 

McAFEE BACK-TO-SCHOOL ESSENTIAL BACKPACK (3)

Approximate ARV for Tier 1 Prize: $400

  • $100 Amazon Gift Card
  • McAfee Backpack
  • McAfee Water Bottle
  • Fujifilm Instax Mini 7s Red
  • Fujifilm Instax Mini Rainbow Film
  • McAfee Total Protection
  • Spiral Notebooks (2)
  • Binders (2)
  • Binder Dividers – 5 pack (2)
  • Planner
  • Ball Point Pens – 24 pack
  • Mechanical Pencils – 40 pack
  • Highlighters – 12 pack
  • Large Erasers – 3 pack
  • Pencil Bag
  • Plastic Ruler
  • Crayola Markers
  • Crayola Colored Pencils
  • Pencil Sharpener
  • Scissors
  • Index Cards
  • Book Covers (2)

Limit one (1) prize per person/household. Prizes are non-transferable, and no cash equivalent or substitution of prize is offered.

The prize for the McAfee Back-To-School #RT2Win Sweepstakes is a ONE (1) Back-to-School Essential Backpack, complete with the above supplies, for each of the three (3) entrants. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Back-to-School #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Back-to-School #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

7. General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Back-to-School #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Back-to-School #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Back-to-School #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Back-to-School #RT2Win Sweepstakes -related activity, or participation in the McAfee Back-to-School #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

8. Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

9. Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with the prize McAfee Back-to-School #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Back-to-School #RT2Win Sweepstakes.

10. Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Back-to-School #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Back-to-School #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

11. Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of the State of New York, U.S.A.

12. Privacy Policy: 

Personal information obtained in connection with this prize McAfee Back-to-School #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after August 27,2018 before September 10, 2018 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA
  4. Administrator: LEWIS Pulse, 111 Sutter St., Suiter 850, San Francisco, CA 94104

The post Back-to-School Cybersecurity 101: #RT2Win an A+ Worthy Prize appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/back-to-school-rt2win/feed/ 0
Take a Holistic Approach to Reviewing Security Strategy https://securingtomorrow.mcafee.com/business/take-a-holistic-approach-to-reviewing-security-strategy/ https://securingtomorrow.mcafee.com/business/take-a-holistic-approach-to-reviewing-security-strategy/#respond Thu, 23 Aug 2018 21:07:30 +0000 https://securingtomorrow.mcafee.com/?p=91145

The first step in building a culture of security in an organization is embedding it into your vision and values. Creating a foundational commitment to security among all employees establishes a strong first line of defense. With that in place, the next step is reviewing each area of the business to ensure you’re walking the […]

The post Take a Holistic Approach to Reviewing Security Strategy appeared first on McAfee Blogs.

]]>

The first step in building a culture of security in an organization is embedding it into your vision and values. Creating a foundational commitment to security among all employees establishes a strong first line of defense. With that in place, the next step is reviewing each area of the business to ensure you’re walking the talk when it comes to thinking security-first. Knowing where to start can be overwhelming. But using this simple framework will guide you through the critical elements.

Begin with a holistic review of your security strategy

In today’s digital world, businesses are more interconnected and fast-moving than ever. It’s important to take a wide perspective and review all angles of security across governance, people, process, and technology.

  • Governance: Depending on many factors – including company size, industry, geography, ownership structure, and more – the level of data governance at a company can vary greatly. It’s worth evaluating what you have in place and considering adding new structures for data protection for the long term.
  • People: This is an organization’s greatest vulnerability, but also its strongest line of defense. Review your education and training for cybersecurity best practices across all levels and departments, from your most junior staff up to executives, and make sure your people are part of the solution.
  • Processes: This should extend beyond just security-specific processes to broader business-level processes. Review data collection, flows, processing, storage, and handling to understand the scope of securing that data. But also evaluate processes for product design and development, new hire onboarding, and other departmental workflows to identify areas to add new security measures.
  • Technology: This is the backbone of your digital organization, so ensuring your technology is secure is table stakes. It’s important to also assess how the systems are actually used by staff and consider changes if people tend to bypass standard procedures to avoid any inconvenient steps required.

Measure outcomes to gauge effectiveness

While gaining clear visibility into actual security strategies in effect across the organization provides understanding of scope, it’s only the first step. As you craft a plan to strengthen your security and implement changes, measuring the impact is critical to evaluating effectiveness. Start by establishing a baseline metric for each change in your plan, whether it is designing new procedures for data protection, rolling out an updated staff training, adjusting steps in product design to consider security, or replacing a technology system.

As updates are implemented, build a cadence of evaluations into regular workflows. For example, include measurement of outcomes in quarterly review or planning cycles. Check progress against the original baseline, including quantitative measurements when possible as well as qualitative feedback from team members to validate. Use that data to course correct and continuously improve implementation of your strategies.

Throughout each stage of this holistic review process and implementation of changes, continually think about how various roles on each team are affected by implementation of changes. Understanding impact and communicating each person’s responsibility to security on a personal level is key to developing a sustainable culture of security.

Steps for Conducting a Holistic Review of Security Strategy

Thinking about the scope and effectiveness of security measures across every area of the business can be overwhelming. Breaking it down into defined segments helps get started. Use this framework to guide your review.

Download one-pager

The post Take a Holistic Approach to Reviewing Security Strategy appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/take-a-holistic-approach-to-reviewing-security-strategy/feed/ 0
A Culture of Security is Built on a Strong First Line of Defense https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/a-culture-of-security-is-built-on-a-strong-first-line-of-defense/ https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/a-culture-of-security-is-built-on-a-strong-first-line-of-defense/#respond Thu, 23 Aug 2018 21:04:48 +0000 https://securingtomorrow.mcafee.com/?p=91137

With the pressure of digital transformation on companies today, executives need to consider how to keep their organization safe amidst rapid change. Most businesses cover their security bases with the basics: advanced analytics, technology using machine-learning and AI, and baseline protocols. But in the face of today’s rising threats, the basics may not be enough. […]

The post A Culture of Security is Built on a Strong First Line of Defense appeared first on McAfee Blogs.

]]>

With the pressure of digital transformation on companies today, executives need to consider how to keep their organization safe amidst rapid change. Most businesses cover their security bases with the basics: advanced analytics, technology using machine-learning and AI, and baseline protocols. But in the face of today’s rising threats, the basics may not be enough. On top of that, the need to keep up may lead to oversight of key security measures.

A McAfee cloud security report last year found almost 40% of cloud services are commissioned without the involvement of IT. As a result, 65% of IT professionals think this interferes with their ability to keep the cloud safe and secure. The responsibility of safeguarding businesses must now extend beyond the purview of IT. So, what can leaders do to ensure they’re protecting their companies? McAfee has identified key first steps to build the foundation of an organization-wide culture of security in which every employee plays a role.

Begin with a vision and values that prioritize security

Employees can be the best defense or the greatest vulnerability when it comes to cybersecurity. Whether your company is in the business of security or another industry, getting staff to keep security top of mind in everything they do is critical. This begins with embedding security into the vision and values of the organization from the top down.

While McAfee has the advantage of its teams already living and breathing cybersecurity every day, CEO Chris Young knew more was needed to create a culture of security people truly owned. The leadership crafted The Pledge, a commitment all employees make to crystalize their dedication to security. To keep this top of mind, copies of The Pledge are posted throughout the office and included on notebooks and badge cards. Visibility and reinforcement from leadership is essential to maintaining the importance of this value.

Employ technology that supports rather than inconveniences

All too often new systems are put into place without considering the practical application for users. Change is always hard, but when technology updates result in additional steps or obstacles for employees, chances are they’re going to look for a shortcut. But these types of workarounds open doors to exactly the risks IT and security teams are working to avoid. By implementing technology systems that motivate staff to make smart decisions without overly burdening them, structures are put in place to inherently encourage secure behaviors.

Think security-first across all teams

It’s not enough to train employees to be security-minded in their online activities. Organizations need to think beyond that initial vulnerability and build security into every aspect of their business. This could include planning a step in the product design process that considers security implications. Or when drafting partnership agreements, a new clause may be added to cover security risks and protocols. HR teams can introduce a security-first mentality right from the start through the hiring and onboarding process.

Businesses have too much to lose if they don’t prioritize security at every level. Cybercrime costs companies hundreds of billions of dollars annually, even putting smaller firms out of business entirely. With more and more data to protect and cyber threats continually evolving, everyone must play a part in creating a culture of security.

Tips to Establish a Strong First Line of Defense

Every executive wants to be sure they’re doing everything they can to protect their company. These starting points for building a foundation of a culture of security across your organization will help you think through your approach.

Download one-pager

The post A Culture of Security is Built on a Strong First Line of Defense appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/a-culture-of-security-is-built-on-a-strong-first-line-of-defense/feed/ 0
All Work and No Play? Not at McAfee! https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/all-work-and-no-play-not-at-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/all-work-and-no-play-not-at-mcafee/#respond Fri, 17 Aug 2018 14:00:27 +0000 https://securingtomorrow.mcafee.com/?p=90924

By Srinidhi, Software Quality Engineer There’s more to life than work.   It’s a commonly held and often stated view, but companies that take it to heart are few and far between. McAfee is one of those few.  Well known as an industry leader, the creator of powerful security technologies and solutions, McAfee also believes it is […]

The post All Work and No Play? Not at McAfee! appeared first on McAfee Blogs.

]]>

By Srinidhi, Software Quality Engineer

There’s more to life than work.  

It’s a commonly held and often stated view, but companies that take it to heart are few and far between. McAfee is one of those few. 

Well known as an industry leader, the creator of powerful security technologies and solutions, McAfee also believes it is vital to build community among employees through clubs and events, promoting and facilitating fun, engaging and educational activities for employees. And this company puts that belief into action! 

McAfee Photography Club

In India, McAfee established the M-Alive employee engagement committee to support various activities to encourage creativity and learning, one of which is McAfee Photography Club. 

This is close to my heart. As a wildlife enthusiast with a love of nature, I’ve found digital photography an ideal tool to help me observe nature and express my desire to understand it more deeply. Over the years, learning the art of photography has become a hobby in its own right. 

Quarterly Competitions

McAfee Photography Club runs quarterly photographic competitions. These have proven to be popular with employees, the very first competition drawing over 100 submissions. Given the wide range of images submitted, we decided to adopt a different theme each month (which has done nothing to reduce the substantial numbers of excellent images submitted monthly!) Each month’s winning images are framed and displayed around the office.  

The competition engages large numbers of employees, either entering their photographs in the competition or simply appreciating others’ images and the extensive talent we have at McAfee. Entries are viewed across the world – one woman in Europe commented on an image of a magnificent lion which sadly lost its fight against cancer: “As I go through this phase of struggle in my life, this image means a lot to me”. It’s wonderful to me that our art can be so helpful to others. 

A Great Place to Work

Photography is just one example of the many areas – sports, arts, sciences and others – encouraged and supported by McAfee. The company invests enthusiastically in helping employees pursue interests and build community within the business. McAfee is truly a great place to work.

For more stories like this, follow @LifeAtMcAfee on Instagram and @McAfee on Twitter to see what working at McAfee is all about. Interested in joining our teams? We’re hiring! Apply now.

 

 

 

The post All Work and No Play? Not at McAfee! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/all-work-and-no-play-not-at-mcafee/feed/ 0
Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/qa-with-software-qa-manager-how-mcafee-empowers-me-to-shape-the-future/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/qa-with-software-qa-manager-how-mcafee-empowers-me-to-shape-the-future/#respond Mon, 13 Aug 2018 15:38:20 +0000 https://securingtomorrow.mcafee.com/?p=90880

By Simon, Software QA Manager Simon is a Software Quality Assurance Manager at the McAfee Aylesbury office. He joined the company 11 years ago and has fulfilled various roles at McAfee Labs, where he found his passion for improving the quality of the technology we deliver to McAfee customers. Who doesn’t want to live out […]

The post Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future appeared first on McAfee Blogs.

]]>

By Simon, Software QA Manager

Simon is a Software Quality Assurance Manager at the McAfee Aylesbury office. He joined the company 11 years ago and has fulfilled various roles at McAfee Labs, where he found his passion for improving the quality of the technology we deliver to McAfee customers.

Who doesn’t want to live out their passions in their career? It’s something people spend decades looking for and not all are fortunate to find. For my part, I’m thankful I found a company where I discovered both and can live out my passion: raising awareness of the importance of software testing and quality assurance.

Some of you may be wondering what exactly quality assurance is. It’s ensuring the software McAfee offers is of the highest quality and delivers world-class results for our customers. In the eleven years I’ve been with McAfee, I’ve been provided plenty of opportunities to learn, collaborate and carry out my goal of sharing knowledge along the way.

Questions? It’s part of my job to have answers (Get it? QA?). Here are three questions I’m commonly asked about my QA journey and love for raising awareness:

What inspired me to pursue QA testing?

One of my most memorable experiences at McAfee was attending TestBash in 2015, the UK testing conference. Not only was this a great time to build relationships and network, but it also ignited my enthusiasm for software testing, introduced me to new concepts and drove the idea of testing communities home. If you have an opportunity to attend or are interested in QA, I strongly recommend you go!

When did I realize raising awareness about QA was important?

A couple of years ago, my alma mater invited me to present a career talk. I was excited to share my enthusiasm for QA with students, but the university stated QA was not part of their curriculum. After extensive research, I discovered only one out of the UK’s top 25 universities offered a testing/QA module.

Knowing the value of QA, I decided then and there I would help spread the word about testing to universities and broader community to improve the skills of potential candidates for future roles. I’ve given careers talks at various universities, joined the University of Buckingham’s Industry Advisory Board and spoke at London’s UKStar Testing Conference and the Online Test Conference.

Another way I do what I love in educating the next generation is with McAfee’s Online Safety Program. As a certified instructor, I teach children in the UK about the importance of cybersecurity, cyber safety and cyber ethics.

How do I bring this QA passion into McAfee?

McAfee has always supported my personal development and live out my passions both for QA and teaching others, through internal and external collaboration.

Inspired by TestBash a few years ago, I formed the Aylesbury Tester Gathering, a testing and quality community that connects interested McAfee employees and like-minded individuals from other companies. McAfee stands by Together is Power and fully supports this endeavour of mine by providing a location for our monthly gatherings.

I recently launched the McAfee UK & Ireland Quality Chapter, a  networking group that brings engineering teams and other interested individuals together. Between the Aylesbury, Brighton and Cork offices, McAfee makes it simple for the chapter to share test automation and ideas, through monthly WebEx calls between the 3 sites. We all share the ultimate aim of getting teams aligned on the same goal, improving the quality of the McAfee products and releases.

As a Software QA Manager at McAfee, I’m determined to help build the best teams possible. I lead my team members in best practices, support them by working through challenges and encourage a networking mindset for professional growth.

By encouraging me to grow my leadership skills, lead collaborative communities and focus on more than creating higher quality software, McAfee empowers me to shape the future and help to protect the world from cyber threats.

If you’re still looking for your passion or for a company that supports your interests and encourages you to do more, I can tell you it’s worth the search.

For more stories like this, follow @LifeAtMcAfee on Instagram and @McAfee on Twitter to see what working at McAfee is all about. Interested in joining our teams? We’re hiring! Apply now.

The post Q&A with Software QA Manager: How McAfee Empowers Me to Shape the Future appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/qa-with-software-qa-manager-how-mcafee-empowers-me-to-shape-the-future/feed/ 0
McAfee Interns Share Their Experience for #NationalInternDay https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-mcafee-interns-share-their-experience-on-nationalinternday/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-mcafee-interns-share-their-experience-on-nationalinternday/#respond Wed, 25 Jul 2018 11:22:07 +0000 https://securingtomorrow.mcafee.com/?p=90509

By Christie, HR Communications Intern As someone who always wanted to make an impact in the world, I thought nonprofit was the only fit for my passions in marketing and philanthropy. Because of this, I’ve worked primarily in the nonprofit sector for the last three years. But to keep my options open, I desired to […]

The post McAfee Interns Share Their Experience for #NationalInternDay appeared first on McAfee Blogs.

]]>

By Christie, HR Communications Intern

As someone who always wanted to make an impact in the world, I thought nonprofit was the only fit for my passions in marketing and philanthropy. Because of this, I’ve worked primarily in the nonprofit sector for the last three years. But to keep my options open, I desired to experience at least one corporate internship before I graduated college.

I wasn’t sure if any company would take me under its wing due to my lack of corporate experience though. That was until McAfee offered me the opportunity to work with them this summer.

As a senior in college, McAfee provided me the real-life experience I hoped for and more. Below are the top three reasons why my internship experience with McAfee has truly been nothing less than invaluable:

Playing to Win Even as an Intern

Since day one, I knew this internship was unique and not like any other. Everyone at McAfee works with agility. Although the nonprofit industry is notorious for moving fast, it is still fascinating to see employees so eager to work on tasks of all sizes with such drive and efficiency.

Instead of being delegated tasks to fulfill, I get to share what I want to work on and what I want to take away from my time working with McAfee.

As a huge social media enthusiast, I helped manage @LifeatMcAfee’s Instagram strategy from implementing new social trends, generating online advertisements and publishing my own designs.

But the best part? I am not seen or approached as an intern, but as a team member. I am held to the same expectations and given the same opportunities – being able to add value to the team and carry out real, impactful work every day.

People First and Foremost

If I’ve learned anything from my first 10 weeks here, it is that McAfee genuinely values its employees and community. McAfee does not shy away from diversity or from supporting its employees in every way possible.

I experienced this firsthand by assisting with social media during Pride Month by covering the Global LGBT Pride Photo Competition, Gender Revolution Documentary Watch Party and Keyeon’s “How I Wear My #McAfee Pride” Life at McAfee blog. Although this doesn’t fully portray how McAfee practices inclusive candor and transparency, it really showed me how McAfee embraces diversity and its employees’ authentic selves.

Giving back is also very important in McAfee’s company culture. This is visible through its various events and programs such as Global Community Service Day, McAfee Explorers, Bring Your Kid to Work Day, McAfee Blood Drive, and the list goes on and on. This undeniably displayed to me McAfee also shares my value of making a positive impact on the world. And knowing colleagues share this significant value with me, reinforced McAfee as a truly one tight-knit, loving family.

Together is Power

On the first day of my internship, I signed my name on the McAfee Pledge Wall among all the other employees’ signatures – signifying our single pledge to defend the world from cyber threats.

This symbolic gesture is evident every day when I step my foot into the office. I work with people from different positions, departments and even countries. Everyone is always willing to help, even in projects they’re not involved in.

This sense of togetherness is something I really value and believe is one of the best things about working at McAfee. We all have one mission that we want to fulfill and strive towards every day, together.

An Unforgettable Experience

McAfee makes an impact in the world every day by providing the best cybersecurity possible, but also gives back to the community and its employees through its various educational and community outreach programs. But notably, McAfee has made a lasting impact on me. These short 10 weeks have shown me my career options are unlimited and I can truly make a difference in any field of work, especially with a great team that strives to fulfill the same mission as I do every day.

Read from other McAfee interns from around the globe about their internship experiences below!

Internship Experiences at McAfee

 

Juan – Customer Experience (Argentina)

“These past few months, I got to meet some of the most talented people and all of them were eager to share their knowledge and expertise with me. McAfee is truly a great place to work while making our world and our communities a safer place.”

 

 

 

 

Emily – Digital Marketing & Content Operations (US)

“I get to help my team work on redesigning our Marketing Intranet, so that new Marketing hires, as well as existing employees, can have a resource to answer questions they may have. I really love working here at McAfee!”

 

 

 

 

Adam – Human Resources & Talent Acquisition (Ireland)

“This opportunity has provided me with priceless experience and insight into one of the leading cybersecurity companies in the world. I have been extremely privileged to have been given the responsibilities I have had during my time here and I have gleaned a vast amount of experience as a result.”

 

 

 

Mark – Advanced Threat Research (US)

“I got to meet all the wonderful people I’d be working most closely with, whose locations ranged from Dallas to the UK. McAfee places importance on interpersonal relationships in their teams and even as an intern, I was treated as one of the gang since day one.”

 

 

 

 

Csaradhi – Platform Engineering (India)

“The transition from college to corporate life has been so beautiful. I’ve learned so many tings apart from the technical aspects. I thank McAfee for choosing to believe in me and I’m here to make the most of it.”

 

 

 

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now.

The post McAfee Interns Share Their Experience for #NationalInternDay appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-mcafee-interns-share-their-experience-on-nationalinternday/feed/ 0
Facing the Fear of Public Speaking with Toastmasters https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/facing-the-fear-of-public-speaking-with-toastmasters/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/facing-the-fear-of-public-speaking-with-toastmasters/#respond Mon, 23 Jul 2018 18:41:34 +0000 https://securingtomorrow.mcafee.com/?p=90473

By: DaWane, Sales Director Standing in front of 800 parents and fellow students to deliver the welcome address, thoughts swirled around in my head. My hands were shaky, my palms oozed with sweat and I had a death grip on the podium. They say I did well, but inside, I was so uncomfortable, I thought […]

The post Facing the Fear of Public Speaking with Toastmasters appeared first on McAfee Blogs.

]]>

By: DaWane, Sales Director

Standing in front of 800 parents and fellow students to deliver the welcome address, thoughts swirled around in my head. My hands were shaky, my palms oozed with sweat and I had a death grip on the podium. They say I did well, but inside, I was so uncomfortable, I thought I may vomit.

That was my experience as a 16-year-old high school senior as president of the National Honor Society during a school function. And it was a moment when I swore I’d never, ever feel that way again.

My strategy? Avoid all circumstances that could even possibly place me in a position to feel so vulnerable. It worked—until I was promoted in to sales leadership. Haunted by that moment in high school, I decided if public speaking was expected of me, I had two options: I could A) quit or B) tackle my fear head-on.

I chose option B. Thanks to McAfee Toastmasters, I am a skilled public speaker and am now heading up our office chapter in Plano.

Conquering My Fear of Public Speaking

I started overcoming my fears by seeking out opportunities to push myself out of my comfort zone—again, again and again. I presented to new hire classes. I volunteered to present at sales kick-offs. I even took a class called Acting for Non-Actors. Whatever gave me a chance to get more stage time, I was in.

About a year into my career at McAfee, I was invited to a humorous speech contest hosted by Toastmasters. I watched talented people deliver funny and well-done speeches. I thought to myself, “I can do that,” but the only way I’d know for sure was to give it a try.

Getting Involved and Growing with McAfee Toastmasters

Soon after, I realized McAfee had internal Toastmasters chapters in Santa Clara, Waterloo, India and Plano. I visited Plano Toastmasters, which validated my theory that public speaking is muscle memory. The more you do it, the better you become.

More importantly, the more comfortable you become enables your desire to do it more. It’s a vicious cycle, but a good one.

But last year, the McAfee Toastmasters in Plano was in danger of dissolving. Knowing the difference practice makes and wanting to help others overcome their fears, I knew I couldn’t let that happen.

In a 1×1 with my VP, I shared the growth I experienced in public speaking during my short tenure in Toastmasters and recalled the severe stage fright I plowed through. He agreed that even if you’re pretty good on stage, there is always room for improvement and how valuable this could be to others as well.

He assigned the resurrection of the McAfee Plano Toastmasters chapter to me as my own leadership development project.

Leading the Charge for Toastmasters 

I worked with various McAfee executives to pitch the value of a Toastmasters chapter and the benefits to individuals and the entire organization.

In addition to improving your public speaking skills, Toastmasters brings opportunities to develop hands-on leadership experience—not only during chapter meetings but as a club officer or in district leadership.

Toastmasters resonated with enough people that we relaunched McAfee Plano Toastmasters in January 2018 starting with 21 members. Over the first 6 months of 2018, we successfully competed in speech contests. We recently signed our 42nd member and installed a new set of officers, who will lead our club going forward into the next wave of success. And for the first time ever, McAfee Toastmasters achieved “Distinguished” status.

A Long and Rewarding Journey

It has been an honor to be part of this resurrection story and to see the growth of our members—from each meeting held to each speech given. If you’ve ever had to give a speech and left the stage thinking, “Well, I’ll never do THAT again,” there is a solution.

For me, it was Toastmasters. I appreciate the learnings McAfee’s Plano chapter left me with and now the opportunity to lead and help others speak confidently in front of a crowd.

Interested in joining our teams? We’re hiring! Apply now!

The post Facing the Fear of Public Speaking with Toastmasters appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/facing-the-fear-of-public-speaking-with-toastmasters/feed/ 0
How My McAfee Internship Launched My Career https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-my-mcafee-internship-launched-my-career/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-my-mcafee-internship-launched-my-career/#respond Mon, 23 Jul 2018 15:17:21 +0000 https://securingtomorrow.mcafee.com/?p=90459

By: Ruby, Digital Media Specialist It’s often assumed that interns are usually college undergraduates with a temporary assignment. I’m an exception to the rule in both respects. I started as a McAfee intern while I was a part-time graduate MBA student at Santa Clara University. Through my internship, I secured a full-time position on McAfee’s […]

The post How My McAfee Internship Launched My Career appeared first on McAfee Blogs.

]]>

By: Ruby, Digital Media Specialist

It’s often assumed that interns are usually college undergraduates with a temporary assignment. I’m an exception to the rule in both respects. I started as a McAfee intern while I was a part-time graduate MBA student at Santa Clara University. Through my internship, I secured a full-time position on McAfee’s Digital Media team.

A Life-Changing Experience

My internship at McAfee has literally changed my life. I’ve been able to explore various aspects of marketing—starting out in Digital Content Operations where I helped with website content and design—and later transitioning to the Digital Media team. It was here that I discovered my love for digital media, found my niche in marketing and earned my position as a full-time McAfee employee.

I love my work, but over the three years I have been at McAfee, there are two primary reasons why I’ve never considered moving on: the people and culture. There’s a real opportunity at McAfee to build an exciting career, even from a standing start as an intern.

When I started my internship at McAfee, I worked with a group of marketing interns and had the opportunity to create relationships with everyone on the Content Marketing team. Several co-workers took me under their wing which helped me tremendously and was key in enabling me to advance to where I am today. McAfee has a unique culture full of learning, innovation, excellence, and challenge—with everyone supporting each other.

Out and About for McAfee

McAfee makes it a point to send interns to conferences and events. During my internship, I traveled to Black Hat USA in Las Vegas, RSA Conference in San Francisco and attended MPower Cybersecurity Summit twice, a McAfee customer event in Las Vegas!

Black Hat was amazing and probably one of the best experiences I’ve ever had. All four events opened my eyes to the power of real-time social media, as well as the importance of cybersecurity to enterprises and individuals alike.

Wearing Many Hats: A Balancing Act

I am often asked how I balance full-time employment with school and everything else in life. While the answer may seem simple, (good time management and stress relief outlets!) anyone who wears multiple hats knows that life can be a balancing act. To tackle stress, it’s all about working out for me! In addition to working at McAfee and pursuing my school studies, I’m a half marathon, triathlon and swim coach.

The culture at McAfee has been a huge gift. My managers understand the challenges I face and the benefits my MBA will bring both to me and the company. They have been very supportive of my school schedule along the way.

McAfee helped me launch my career and find work that I’m passionate about while pursuing higher education. I have an exciting and challenging career path ahead of me and I’ve made several lifelong friendships that would never have happened if it were not for McAfee. It’s a great place to be and I am thankful to be here!

For more stories like this, follow @LifeAtMcAfee on Instagram and @McAfee on Twitter to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

The post How My McAfee Internship Launched My Career appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-my-mcafee-internship-launched-my-career/feed/ 0
Taking the Robot out of the Human https://securingtomorrow.mcafee.com/business/taking-the-robot-out-of-the-human/ https://securingtomorrow.mcafee.com/business/taking-the-robot-out-of-the-human/#respond Thu, 28 Jun 2018 07:00:08 +0000 https://securingtomorrow.mcafee.com/?p=90149 This blog post was written by Nick Viney. Artificial intelligence, or simply AI, was merely a dream a number of years ago – now, not only are we seeing it become more common in our everyday lives, it’s beginning to be a very hot topic amongst businesses. Last year, the Boston Consulting Group and MIT Sloan […]

The post Taking the Robot out of the Human appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

Artificial intelligence, or simply AI, was merely a dream a number of years ago – now, not only are we seeing it become more common in our everyday lives, it’s beginning to be a very hot topic amongst businesses. Last year, the Boston Consulting Group and MIT Sloan Management Review study published a report that found 84% of respondents thought AI will enable them to obtain or sustain a competitive advantage whilst 75% felt AI would allow them to move into new businesses and ventures. Simply put, AI is revolutionising business as we know it.

Many business leaders agree that having AI and a level of self-automation being present in some part of a business, however big or small, is beneficial. However, there are still a number, albeit a small group, of leaders who have voiced their concerns. At the very worst, there is a worry that should AI become too prominent, the worst-case scenario is a humans vs robots with ultimately the human workforce being side-lined. Putting that to one side, the benefits of AI in business is vast and here are a few examples of how I believe AI will be revolutionising the enterprise space in the not too distant future:

Redefining logistics

When AI and robotics were added to the production line, many feared that manual jobs would become solely automated. However what sceptics of robotics don’t realise is that it was implemented to take on the smaller, less critical tasks – like packing, stacking and labelling boxes. Many think the world is on the verge of a technological revolution, or the “The Fourth Industrial Revolution” (4IR) which is a combination of technologies that fuse the physical, digital and biological worlds together – a world where machines can think for themselves.

Similar to production lines, basic data entry and programming roles are becoming much more efficient and cost-effective through AI. Filling vacancies with long-term, fully automated AI-powered computers could be the answer, but in the short term, teaching smart technology to work alongside human talent could be the way forward for businesses and help bridge the skills gap, which takes me onto my next point.

Data Insights

Whilst the access to time and skills is limited and businesses become more and more data-driven, it’s clear that taking two weeks to manually translate raw data has significant implications. With the volume of data being generated on a daily basis, it’s no surprise that inaccuracies occur. Whilst time is eaten by employees tidying data into something that’s meaningful – chances are that by the time it’s complete, it’s already out of date. Sceptics will argue that certain jobs can be done more efficiently by humans, however, this can come at a higher cost in man-hours and more receptive to human error. Jeopardising the security of your business cannot be an exception at any cost.

Improving data security

Cybersecurity is a critical part of enterprises with businesses spending billions of dollars each year in making sure its defences are able to keep out hackers. The job of staying ahead of hackers is incredibly challenging for CTO’s, but the capabilities of AI can certainly help. Whether it’s the latest spyware, DDoS attack patterns or botnets, hackers are constantly evolving and adapting to find new ways in which to breach a company’s data defences. Where we’re seeing AI supporting is having the ability to scour the internet to look for some of these threats ahead of time and before they are used against companies. Human security analysts can only do so much and in many cases, the pace and change to the threat landscape are simply too much. Leveraging AI and deep learning to help human analysts will make things a lot safer for businesses.

Bridging the skills gap

Despite AI’s potential to drive change, there continues to be a shortage of cyber skills. According to a ESG survey of 650 IT cybersecurity professionals this year, 51% claimed they had a “problematic shortage of cybersecurity skills”. The ramifications include increased workload on cybersecurity staff to hire and train juniors as opposed to hiring experienced cybersecurity professionals – leaving less time to deal with cyber crises when they need to. However, this shouldn’t be seen as replacing jobs, but will instead increase the need for workers with more advanced skills. Businesses need to invest in creating a culture of constant learning for their staff where they can learn new skills and attract leading AI practitioners. The introduction of AI could help bridge the gap by widening skills and allowing employees to work alongside machines – leaving AI to manage less critical jobs.

AI should not only create time for innovation and proactive threat hunting but deliver cost savings and increase employee productivity. Like the revolutions that preceded it, 4IR has the potential to improve the quality of life for employees and their employers around the world. With AI taking a leading role in tackling simple and repetitive tasks, the human workforce can focus on roles that are more complex, challenging and require much more critical thinking power. Unfortunately, though we cannot see the future yet, businesses should think more holistically about the advantages of AI and what can be reaped, before competitors do.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post Taking the Robot out of the Human appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/taking-the-robot-out-of-the-human/feed/ 0
How I Wear My #McAfeePride https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-wear-my-mcafeepride/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-wear-my-mcafeepride/#comments Wed, 20 Jun 2018 14:13:44 +0000 https://securingtomorrow.mcafee.com/?p=89962

By: Keyeon, Business Development Representative Imagine if you felt like you had to keep a secret from everyone you know, because if you told someone, then you might lose family, friends, healthcare coverage, money or worse, your dignity. Being open at work can be a challenge. No one wants to feel that their job is […]

The post How I Wear My #McAfeePride appeared first on McAfee Blogs.

]]>

By: Keyeon, Business Development Representative

Imagine if you felt like you had to keep a secret from everyone you know, because if you told someone, then you might lose family, friends, healthcare coverage, money or worse, your dignity. Being open at work can be a challenge. No one wants to feel that their job is at risk or opportunities for advancement are limited. According to the Human Rights Campaign, 35% of LGBT employees feel compelled to lie about their personal lives while at work. As for me, I’m proud to be part of the 65% who feel comfortable to bring my full, authentic self to work.

This Pride month, I’m celebrating my first year at McAfee. Moving to a different city by yourself comes with a few obstacles—especially when you move only two weeks after graduating college. Once I started my job at McAfee, I doubted how OPEN I could truly be. Between the endless support from coworkers who welcomed me with open arms, to McAfee’s Pride flag flying high in the sky next to the American flag, I quickly realized that I was in the right place.

#McAfeePride

In the spirit of Pride month, McAfee is hosting month-long celebrations around the globe including flag raising ceremonies, on-site Gender Revolution showings, ice cream socials and my favorite: the #McAfeePride photo challenge. During the first week of June, employees wore a different color of the Pride flag each day. Below are photos of how I wore my #McAfeePride.

Each color represents something specific to show the diversity of the LGBT community. Coming to work and seeing people wearing these colors makes me feel proud. Reports show people are afraid to come out of the closet at work because they’re afraid that they won’t be accepted. By showing that you’re an ally to the LGBT community, you are encouraging others who may feel alone.

The Value of Inclusiveness

At McAfee, we value inclusive candor and transparency. This value clearly represents how McAfee runs towards diversity and encourages people to be who they are without fear.

You’ll find proof of this within the McAfee LGBT Community. This exists so that every day, not just during the month of June, the Lesbian, Gay, Bisexual and Transgender (LGBT) Community can feel proud at work. The McAfee LGBT Community courageously challenges and eliminates perceptions about LGBT employees and allies. They support inclusiveness and business principles by bolstering efforts to recruit, integrate and retain LGBT employees and allies in the workforce.

Working at McAfee has given me mentors and friends that I would have never gained working at a different company. My colleagues don’t judge me for my orientation. Instead, they care about the ideas I bring to the table and the dedication I show my team every day. No human should ever feel afraid of acceptance in the workplace, which is why I am proud to be a part of the McAfee family.

I’m Keyeon and I love to live LIFE to the fullest. I have a rough past, but I’m HEALING with no scars. When I walk into a room, my smile brings a ray of SUNLIGHT. I am one with NATURE and practice the ART of having a joyful SPIRIT each and every day. I am McAfee, We are McAfee, and You are McAfee!

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter via @McAfee to see what working at McAfee is all about.

Interested in joining our team? We’re hiring. Apply now!

The post How I Wear My #McAfeePride appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-i-wear-my-mcafeepride/feed/ 1
Play The Game – Tips and Tricks for Safe Online Gaming https://securingtomorrow.mcafee.com/consumer/play-the-game-tips-and-tricks-for-safe-online-gaming/ https://securingtomorrow.mcafee.com/consumer/play-the-game-tips-and-tricks-for-safe-online-gaming/#respond Wed, 20 Jun 2018 07:00:14 +0000 https://securingtomorrow.mcafee.com/?p=89983 This blog was written by Jessica Brookes. When I was child, gaming was all joysticks and arcades. Now, it’s all about hyper realistic graphics, immersive experience and above all, playing online against players from all over the world. Since the early 2000s, we’ve seen online gaming grow into a worldwide phenomenon, increasing hugely in popularity […]

The post Play The Game – Tips and Tricks for Safe Online Gaming appeared first on McAfee Blogs.

]]>
This blog was written by Jessica Brookes.

When I was child, gaming was all joysticks and arcades. Now, it’s all about hyper realistic graphics, immersive experience and above all, playing online against players from all over the world.

Since the early 2000s, we’ve seen online gaming grow into a worldwide phenomenon, increasing hugely in popularity among children and adults alike and expanding from consoles and PCs to mobile phones and tablets.

A 2017 study by Newzoo found that approximately 32.4m people in the UK play games, that’s almost half the population. These findings are in line with the findings of a GameTrack (ISFE & Ipsos Connect) survey which highlights a rise in gaming among older generations in the European market (UK, Germany, France and Spain). According to the report, the number of 35-44 year old gamers increased from 36% to 46% between 2012-2016. In the same timeframe, gaming among 45-64 year olds rose from 21% to 27%. Clearly gaming is no longer just for teenage boys.

However, while the evolution of online gaming has led to an enhanced multiplayer experience for players, it has also contributed to a worrying rise in “virtual crime” – real-world criminal activities that are committed through massively multiplayer online games (MMOGs), including hacking, fraud and child grooming.

With these dangers in mind, here are the key areas to look out for when gaming online and some helpful tips on how to keep your family safe. Ready player one?

Be anonymous

McAfee research has shown that 60% of parents worry about cybercriminals hacking personal or financial information from their children’s accounts. With gaming, online ID profiles can often contribute to this problem for children and adults alike. To play online, players are required to create a user profile so that they can access the appropriate console/computer network. As user handles are public, you should avoid displaying personal information which could potentially be used by hackers i.e. name, address, date of birth, email addresses. Players should also avoid using this type of information when creating account passwords as these networks could be susceptible to hacking. Passwords should be unique, complex and should never be shared with other users.

Careful who you chat to

Online games frequently have built-in messenger services to allow players to contact each other. McAfee research has shown that 62% of kids play games where they speak to other people. If your child participates in online gaming, make sure that they are aware of the associated risks of chat rooms such as interacting with strangers and sharing personal details. These threats can be effectively prevented by using the console’s or PC’s internal parental control settings to disable messaging services and blocking access to the internal network store. Another top tip is to avoid opening instant messages with attached files or links and never share online player account details such as passwords and payment details with unauthorised sources.

Something phish-y

According to McAfee’s latest research, 58% of parents worry about kids clicking on links that might lead to malware. With online gaming, the threat of this danger is high as modern games often encourage players to purchase exclusive in-game content with real-money via virtual online stores. To cut costs, players (usually younger gamers) are often tempted to download patches/packages from unauthorised users which claim to grant access to this content. These actions can often lead to major security risks. Please be aware that downloading content using unverified channels could lead to your console/device becoming infected by viruses or spyware. Always check the authenticity of downloads and take care what you open.

Get protected

Although leading games consoles are largely insulated from virus/malware threats, online PC and mobile games are highly at risk to these threats. When gaming online, make sure you have effective and updated antivirus/anti-spyware software and a firewall running to stop malicious programs from infecting your device.

As the recent success of massive multiplayer games and the rise of eSports have demonstrated, the online gaming bubble shows no signs of bursting anytime soon. Gaming looks set to continue evolving in exciting ways and remain a favourite pastime of people of all ages for the foreseeable future. According to McAfee, it might even help millennials forge careers in cyber security.

Nevertheless, as modern games continue to push the boundaries of the multiplayer experience and criminals/hackers become increasingly more innovative in running scams to exploit them, it is more important than ever to ensure that you keep your devices safe and protected when gaming online.

Our award-winning Secure Home Security products are a clear example of how vendors like us are adapting our solutions to encompass all areas of a user’s home life on the digital plane, from work to entertainment. Please check out the McAfee Home blog for further updates etc.

The post Play The Game – Tips and Tricks for Safe Online Gaming appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/play-the-game-tips-and-tricks-for-safe-online-gaming/feed/ 0
Securing the vulnerabilities of working from home https://securingtomorrow.mcafee.com/business/securing-the-vulnerabilities-of-working-from-home/ https://securingtomorrow.mcafee.com/business/securing-the-vulnerabilities-of-working-from-home/#respond Fri, 15 Jun 2018 11:11:56 +0000 https://securingtomorrow.mcafee.com/?p=89861 This blog post was written by Nick Viney. With more and more businesses offering employees the opportunity to work outside of the office, it’s no surprise that IT departments are becoming increasingly nervous about the dangers of remote working. As this method of boosting staff morale becomes common, sensitive company data has the potential to […]

The post Securing the vulnerabilities of working from home appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

With more and more businesses offering employees the opportunity to work outside of the office, it’s no surprise that IT departments are becoming increasingly nervous about the dangers of remote working. As this method of boosting staff morale becomes common, sensitive company data has the potential to be in various risky locations outside the remit of the office safe zone. We’ve rounded up some key areas that all businesses should be focusing on to stay ahead of the game especially when their reputation could be at risk.

Recruiting talent and training

Employees that work outside the four office walls, exposes businesses to the risks of data theft and fraud, even from a distance. By assessing the risks associated with all types of remote working, it’s good practice to train and advise staff on the impact of their actions, otherwise, it’s easy to lose sight of rules and procedures.

Due to the ongoing issue of too few people with the ‘right skills’ in the tech sector, the future to success may be to merge human and machine learning. This could not only reduce the gap, but allow businesses to remain on the front foot against cybercriminals. Without it, we’re could be wasting valuable time that could otherwise be used for innovation and proactive threat hunting.

Share responsibility

With emails and the web being the most common form of digital comms in a workplace, staff must be educated on the key giveaway signs in spotting, flagging and reporting anything that looks suspicious. By sharing the responsibility and encouraging employees to flag anything suspect, you’re naturally raising awareness internally and warning others from falling into similar traps – openness is the key, and this way you’re always one step ahead of those with malicious intent.

You must also have trust in the people that work for you. In the “second economy,” trust is key to the success of a business and the prime casualty of conflict. Without it, you may be putting your company, its data and even your other employees at risk. By evolving both technology and organisational culture, businesses would naturally become more cohesive and share responsibilities where no one can do it alone – ‘Together is Power’.

Security

By ensuring that all systems holding any business related data are fully equipped with firewalls and protective software, you’re reducing the risk of data breaches. Teams must work together to ensure tools can operate collectively to protect and detect potential threats. With some data being too sensitive to be outside of the office walls, it’s useful setting up staff accounts with permissions that limit data or deny staff from accessing it remotely.

Security must be taken seriously – from the CEO’s desk to the end user. This is especially prevalent with employees coming and going constantly in a business – Employers must have strategies in place to ensure accounts are deactivated and activated at any given time. Although it’s still early days, we may see GDPR being an opportunity for security transformation across businesses where a culture of privacy is compulsory.

Cloud control

The Cloud has become an integral part of business, however, its advantages come with its own share of high risks. It’s important to note that each additional data storage site increases your exposure to risks, therefore the number of places you’re storing data should be kept at a minimum. By regularly monitoring for any potential threats and implementing a strong security plan with your employees, you’ll have much greater control of your assets. When you have control, especially focused in one dedicated place it’s easier to locate where security is weakest, identify new gaps and mitigate risk quickly.

With the number of businesses offering flexible working increasing, the risk of vulnerabilities is becoming greater. Employers must take responsibility for how staff are administering their first line of defence and consider what policies they need to put in place to concede to these demands in the safest way possible.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post Securing the vulnerabilities of working from home appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/securing-the-vulnerabilities-of-working-from-home/feed/ 0
Winning the Game at McAfee: How Gamers Become Cybersecurity Workers https://securingtomorrow.mcafee.com/business/winning-the-game-at-mcafee-how-gamers-become-cybersecurity-workers/ https://securingtomorrow.mcafee.com/business/winning-the-game-at-mcafee-how-gamers-become-cybersecurity-workers/#respond Thu, 14 Jun 2018 15:00:18 +0000 https://securingtomorrow.mcafee.com/?p=89028 This blog was written by Jeff Elder. When Austin Ortega was 12, he and his brother fought over who got to play video games like Gorillas and Commander Keen on an old family computer his parents had bequeathed to them. Then one day, they broke it. Their dad brought to their Grapevine, Texas, home a stack […]

The post Winning the Game at McAfee: How Gamers Become Cybersecurity Workers appeared first on McAfee Blogs.

]]>
This blog was written by Jeff Elder.

When Austin Ortega was 12, he and his brother fought over who got to play video games like Gorillas and Commander Keen on an old family computer his parents had bequeathed to them. Then one day, they broke it. Their dad brought to their Grapevine, Texas, home a stack of floppy disks, dropped them in front of the boys, and told them to fix it. They did.

“I think it took like 14 floppy disks. They took a while to install,” says the McAfee technicalsupport engineer, who references gaming in every class he teaches to new employees. “Video games probably pushed a lot of us into an IT job,” says Ortega, 32. “We were sitting in front of a computer for hours, anyway. We might as well get paid for it.”

 

Ninety-two percent of cybersecurity managers say gamers possess skills that make them suited to a career in cybersecurity – and 75% would consider hiring a gamer even if that person had no cybersecurity training or experience.

Welcome to cybersecurity in 2018, where “Winning the Game” is more than a metaphor for beating attackers. Gaming today is part of a strategy to attract scarce workforce talent. And once cybersecurity workers are hired, gaming can help keep them sharp, keep them happy, and keep them, period.

In our recent report, Winning the Game, 950 cybersecurity managers and professionals in organizations with 500 or more employees were surveyed to gain insight into innovation, employee-satisfaction, and gamification.

The corroborating evidence to Ortega’s experience is stacked up like 14 floppy disks:

  • 92% of managers surveyed say gamers possess skills that make them suited for a career in cybersecurity
  • 80% of extremely dissatisfied employees who report their organization does not use gamification say they wish they did.
  • 77% of senior managers say their organization’s cybersecurity would be much safer if they implemented more gamification.

At McAfee, we see that at our company’s main offices in Santa Clara, Calif., and Plano, Texas, and with employees around the world.

“Video games brought me into computers and more technical areas of interest,” says Conor Makinson, a quality assurance engineer in Cork, Ireland. “Personally being one of the ‘young cybersecurity workers,’ I think that some games can really help develop mindsets that are beneficial to working in security.”

This is part of our public outreach to tech workers, a workforce in very high demand. Our chief information security officer told security’s biggest trade show about the benefits of gamification last week. “I’m a gamer,” said Grant Bourzikas at a session on recruiting talent at the RSA Conference in San Francisco. “I hate losing a game three times in a row. I have to win, and my wife is mad because we’re late, but I am focused.” Bourzikas looks for that focus and tries to channel it in our security operations center, where games are part of the work.

All those hours trying to beat a game may have actually been an investment in your career. (Hear that Mom and Dad?)

And building games may take Ortega’s floppy disk challenge into the 21st century. “I actually made flash games, first-person shooter games, and role-player games when I was in high school, and it definitely increased my interested in tech and coding,” says Catherine Gabel, demand generation specialist in Silicon Valley who joined McAfee it its Skyhigh Networks acquisition.

Gaming, like its dark-arts cousin hacking, has global reach. Nam Nguyen, a McAfee sales engineer, grew up gaming in South Vietnam, beginning at age 10. “I spent all of my lunch money on it.” He sees great potential for gamifying cybersecurity. “You have to find out new ways to beat the game, and the same is true in cybersecurity.”

Bourzikas and Chatelle Lynch, McAfee’s head of human resources, are already looking ahead to seek out the future of cybersecurity talent, and see much of it engaged in gaming. Austin Redlin, 17, agrees. “Gaming did, in fact, spark an interest in computers for me,” he says. “I began to want to understand what everything meant in a computer.”

Redlin is headed to the U.S. Marine Corps’ military occupational specialty school for Communications and IT. Is a career in the cybersecurity industry in his future? Well, it runs in the family. His mom, Deb Redlin, is executive assistant to McAfee Chief Technology Officer Steve Grobman.

Gaming and cybersecurity go hand in hand, the young Redlin said – via snail mail to his mom from Parris Island, South Carolina. Boot camp, even in 2018, is still one place that doesn’t tolerate games.

Jeff Elder was a member of the McAfee Digital Media Team.

The post Winning the Game at McAfee: How Gamers Become Cybersecurity Workers appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/winning-the-game-at-mcafee-how-gamers-become-cybersecurity-workers/feed/ 0
Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize https://securingtomorrow.mcafee.com/consumer/gaming-risks-rt2win/ https://securingtomorrow.mcafee.com/consumer/gaming-risks-rt2win/#respond Wed, 13 Jun 2018 18:59:50 +0000 https://securingtomorrow.mcafee.com/?p=89667 In recent years, gaming has grown drastically in popularity – moving from a niche hobby to a mainstream activity for adults and children alike. So much so that the majority (84%) of parents allow their children to play 1-4 hours of video games every single day. Despite this wide-spread video game use, new research from […]

The post Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize appeared first on McAfee Blogs.

]]>
In recent years, gaming has grown drastically in popularity – moving from a niche hobby to a mainstream activity for adults and children alike. So much so that the majority (84%) of parents allow their children to play 1-4 hours of video games every single day. Despite this wide-spread video game use, new research from McAfee reveals that the majority of parents (71%) also worry that their child is at risk of being exposed to inappropriate content while gaming – including content related to adult websites, gambling, drugs or violence.

Even more staggering, 62% of children play games where they directly interact with other players, significantly increasing their risk of being targeted with inappropriate content or asked to share sensitive information. With this increase in popularity, it’s imperative that parents understand the potential cybersecurity risks to their children while playing games, and know how to provide proper guidance to their children to help keep them safe online.

This information have you feeling PWND? Before you decide it’s game over, we’re treating you to a #RT2Win sweepstakes on the @McAfee_Home Twitter handle to help you respawn! Five [5] lucky winners of the sweepstakes drawing will receive a $100 Amazon gift card. The best part? Entering is a breeze! Follow the instructions below to enter and good luck!

#RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Wednesday, June 13, 2018 at 12:00pm PT. This tweet will include the hashtags: #ProtectWhatMatters, #RT2Win, AND #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #ProtectWhatMatters, #RT2Win AND #Sweepstakes hashtags must be included to be entered.
  • Sweepstakes will end on Wednesday, June 27, 2018 at 11:59pm PT. All entries must be made before that date and time.
  • Winners will be notified on Friday, June 29, 2018 via Twitter direct message.
  • Limit one entry per person

How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#ProtectWhatMatters, #RT2Win AND #Sweepstakes” for a chance to win a $100 Amazon gift card. Five [5] total winners will be selected and announced on June 27, 2018. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

McAfee Most Dangerous Games #RT2Win Sweepstakes Terms and Conditions 

How to enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Most Dangerous Games #RT2Win Sweepstakes will be conducted from June 13, 2018 through June 27, 2018. All entries for each day of the McAfee Most Dangerous Games #RT2Win Sweepstakes must be received during the time allotted for the McAfee Most Dangerous Games #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Most Dangerous Games #RT2Win Sweepstakes, duration is as follows:

  • Begins Wednesday, June 13­­ at 12:00pm PST
  • Ends: Wednesday, June 27, 2018 at 11:59pm PST
  • Five [5] winners will be announced: Friday, June 29, 2018

For the McAfee Most Dangerous Games #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Most Dangerous Games Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #ProtectWhatMatters, #RT2Win and #Sweepstakes
  2. Retweet the sweepstakes tweet of the day and make sure it includes the #ProtectWhatMatters, #RT2Win, and hashtags.
  3. Note: Tweets that do not contain the #ProtectWhatMatters, #RT2Win, and #Sweepstakes hashtags will not be considered for entry.
  4. Limit one entry per person.

Five [5] winners will be chosen for the McAfee Most Dangerous Games #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #ProtectWhatMatters, #RT2Win and #Sweepstakes. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on Friday, June 29, 2018 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

Eligibility: 

McAfee Most Dangerous Games #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Most Dangerous Games #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Most Dangerous Games #RT2Win Sweepstakes not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Most Dangerous Games #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of five [5] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Most Dangerous Games #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

Winner Notification: 

 Each winner will be notified via direct message (“DM”) on Twitter.com by June 29, 2018. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

Prizes: 

The prize for the McAfee Most Dangerous Games #RT2Win Sweepstakes is a $100 Amazon gift card for each of five entrants. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Most Dangerous Games #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Most Dangerous Games #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Most Dangerous Games #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Most Dangerous Games #RT2Win Sweepstakes. entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Most Dangerous Games #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Most Dangerous Games #RT2Win Sweepstakes -related activity, or participation in the McAfee Most Dangerous Games #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with these prize McAfee Most Dangerous Games #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Most Dangerous Games #RT2Win Sweepstakes.

Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Most Dangerous Games #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Most Dangerous Games #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of Delaware.

Privacy Policy: 

Personal information obtained in connection with this prize McAfee Most Dangerous Games #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after June 13,2018 before June 27, 2018 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA

The post Don’t Play Games With Your Cybersecurity: #RT2Win a Respawn-Worthy Prize appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/gaming-risks-rt2win/feed/ 0
A Field Trip to McAfee’s World of Cyber https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/a-field-trip-to-mcafees-world-of-cyber/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/a-field-trip-to-mcafees-world-of-cyber/#respond Wed, 13 Jun 2018 15:00:40 +0000 https://securingtomorrow.mcafee.com/?p=89544

By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager Educating the next generation of cybersecurity heroes has always been a passion of ours – it’s one of the many values we share with McAfee. Between McAfee’s Online Safety Program (teaching online safety in the community), Global Community Service Day (a day dedicated to […]

The post A Field Trip to McAfee’s World of Cyber appeared first on McAfee Blogs.

]]>

By: Amanda Steger, Senior Director & Sandra Chin, Engineering Operations Manager

Educating the next generation of cybersecurity heroes has always been a passion of ours – it’s one of the many values we share with McAfee.

Between McAfee’s Online Safety Program (teaching online safety in the community), Global Community Service Day (a day dedicated to giving back), McAfee Explorers (job-shadowing program) and Take Your Child to Work Day (parents bringing their kids to the office to learn about mom and dad’s job), plenty of avenues exist to interest young minds in STEM and cyber.

But it doesn’t end there. McAfee encourages us to find even more ways to impart the importance of STEM locally and meet the unique needs of our community. Those of us in the Oregon office live in a state that lacks a mandated computer science curriculum. Knowing firsthand the importance of STEM education and the power of exposure, we banded together with our Hillsboro colleagues to help fill the void by partnering with Open School NW, a school that provides the tools to graduate and get ahead to the kids that need it most.

This year, we brought 20 Open School students into McAfee’s world for a day to show them what working for a cybersecurity company is all about.

OpenSchool NW’s Day at McAfee Oregon

We welcomed the students to our Hillsboro office with swag bags and then students kicked off their day of cyber education with several activities:

  • McAfee Advanced Threat Research Lab: Students learned how a Tesla Model X is computer driven, and potentially hackable and susceptible to software bugs.
  • Cybersecurity Demos: An engineer from the Office of the CTO demoed a virus acquired from downloading online games, enabling hackers to read the keyboard, microphone, and webcam input from a person’s laptop remotely.
  • Computer Science Introductions with McAfee Employees: Introduced students to hourofcode.com. We wanted to introduces computer science in a fun, non-intimidating way that allows students to learn fundamentals while working on a project of their choosing.
  • Online Safety Training: Training presented essential steps on how to keep personal information private online, while raising awareness on the dangers of over sharing.

Sometimes all it takes is one day to light a spark in a young person’s mind that could potentially lead to a future career in computer science. And this year’s field trip was a huge success! We’re thrilled students reported an awesome experience and would recommend this field trip to a friend or classmate. Many attendees even shared they would consider a career with McAfee after attending the field trip.

McAfee encourages all its sites to take part in educational community service. We appreciate all opportunities to impact future generations, especially those in our own backyard. We’re already looking forward to bringing students back next year!

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

The post A Field Trip to McAfee’s World of Cyber appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/a-field-trip-to-mcafees-world-of-cyber/feed/ 0
My Global Internship Experience https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/my-global-internship-experience/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/my-global-internship-experience/#respond Tue, 05 Jun 2018 13:59:57 +0000 https://securingtomorrow.mcafee.com/?p=89136

By: Madeleine Human Resources, Intern Picture this: approaching the end of your double degree, applying for internships and work experience in your field of choice – Human Resources – but being rejected due to your inexperience in the corporate world. All you have to offer potential employers is a promise to work as hard as […]

The post My Global Internship Experience appeared first on McAfee Blogs.

]]>

By: Madeleine Human Resources, Intern

Picture this: approaching the end of your double degree, applying for internships and work experience in your field of choice – Human Resources – but being rejected due to your inexperience in the corporate world. All you have to offer potential employers is a promise to work as hard as you can, soak up as much information as possible and complete tasks to the best of your ability – but this still isn’t enough for you to get an opportunity.

Well, this was me.

Starting in Sydney

That is, this was me until McAfee took a gamble on me, and gifted me with three wonderful months of experience through an internship in the Human Resources department.

I began my internship in the Sydney, Australia office where I had the opportunity to meet the HR team. They became my go-to team any time I was unsure of something – they were friendly, honest and most of all, helpful. After my first week, I felt like I was a key member of the team. I even got to sign the pledge wall that all McAfee employees sign when they join the company, showing dedication and commitment to work together towards the same vision. I knew this was something I wanted to be a part of!

Moving to Melbourne

After my time in Sydney, I was transferred to McAfee’s Melbourne office for the remainder of my internship. If I had to choose one word to describe this office, it would be ‘fun’. There is always something happening – plenty of social events to help bring the team together. The office is constantly themed to represent the latest major holidays, the pool table is often in use while business discussions occur and it’s not uncommon to have music playing in the background.

Throughout my time in Melbourne, I was immersed in all the basic HR functions, had plenty of exposure to global communications and built strong professional relationships with McAfee employees across the globe. I learned what it meant to network and how important networking would be for my professional career.

As the end of my internship drew closer, I was fortunate enough to be given the opportunity to fly to Dallas, Texas to complete my final week as a McAfee intern at their Plano location.

My first impression of the Plano office was incredible. The team made me feel so welcome, and I instantly felt comfortable – they had even hung Australian flags over my desk! I get the feeling that this office truly focuses on the happiness of its employees – from the scooters around the office to the team lunches and Pups at Work (P.A.W.) Day each Friday. Everyone loves puppies in the office, right?

My time in Plano was a week-long, intense rotation of all Human Resource functions – an experience enhanced by the fast, efficient pace that the Plano office operates at.

The Plano team arranged for me to work with all areas of HR to learn the different functions, experience some inspiring meetings and contribute to meaningful initiatives. I was also able to discover which areas of HR interest me the most, and had the opportunity to ask a million questions of established people in these fields.

The Experience of a Lifetime

Having spent time in multiple McAfee offices, it’s obvious to me that McAfee is a unique place to work. Employees were motivated, driven and hungry for the same end goals, but warm, friendly and fun. The company’s approach to its work is collaborative, encouraging and empowering, as demonstrated by the continuous brainstorming and feedback sessions across various teams.

Going back to Australia I feel confident in finding the next step in my HR career after University. The knowledge and experience I have gained in my time at McAfee, as well as having the company on my resume, will give me the advantage I need to secure my next HR role.

I can’t put into words the knowledge that I am taking away from my time at McAfee – I have truly had the most inspiring and fun three months here as an intern. I can’t thank McAfee, and in particular the HR team, enough for taking a chance on a student without any corporate experience.

 

 

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

The post My Global Internship Experience appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/my-global-internship-experience/feed/ 0
Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online https://securingtomorrow.mcafee.com/consumer/streamin-in-the-sun-your-essential-checklist-for-safely-watching-this-summers-biggest-events-online/ https://securingtomorrow.mcafee.com/consumer/streamin-in-the-sun-your-essential-checklist-for-safely-watching-this-summers-biggest-events-online/#respond Wed, 23 May 2018 10:00:05 +0000 https://securingtomorrow.mcafee.com/?p=89013 With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can […]

The post Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online appeared first on McAfee Blogs.

]]>
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can tune in to these events from home. While these services may offer a brilliant way to be part of the action, with seemingly no-strings attached, it is important to keep in mind the risks involved with streaming live content on your devices. Here’s our checklist to ensure you’re staying safe when using streaming sites.

Keep it legit

When it comes to streaming, sticking to the official channels is your best bet. The major channels in the UK each have their own online live streaming platforms such as iPlayer (BBC), ITV player (ITV) and All 4 (Channel 4), These should be your first port of call when it comes to streaming live television. As long as you have a TV licence and can verify your identity using your email address, you are free to access their live content. This means you can watch as many World Cup games or hours of Prince Harry and Meghan Markle tying the knot as your heart desires. Important to note that these streaming sites will NEVER require you to provide payment details to access these services.

Get what you pay for

For satellite broadcasters such as Sky, BT and Virgin Media, a paid subscription is required as part of your overall package to access their live-streaming services (Sky Go, BT TV, Virgin TV Go). Once signed up with a provider on the right contract, you are free to stream content on your television, laptop, smartphone or tablet. However, please be aware that there is usually a limit to the number of devices which you are permitted to stream from. Be careful using your login details to stream from other devices as changes in authorisation can lead to a wait of a month to register a new one. In addition it’s never a good idea to share your login details with others.

Going public

Although the sites discussed may be legit to use, the Wi-Fi needed to access them while you’re out and about may not be. There are a wide range of security threats associated with using public Wi-Fi, including unencrypted networks, eavesdroppers and malicious hotspots. All of these dangers can expose vulnerabilities of your device which could allow hackers to to access your personal data and install malware. To stay safe, think about using a virtual private network (VPN) when using your smartphone, tablet or laptop to watch live streaming on the go. Or for those less tech confident, never leave your Wi-Fi or Bluetooth on when you aren’t using it (airplane mode is great for shutting these off quickly).

Don’t even think about it

OK, so the Champions’ League final is on a subscription service that you don’t have. Desperate to watch the game, you venture online to search for one of those streaming sites which promise to broadcast live sport for free. Seems too good to be true? That’s because it is. Users should avoid using these websites. Many don’t deliver what they advertise, often tricking viewers into sharing their payment details so that they can access personal content or infect your device with malware. More importantly, these streams are illegally broadcasting live content. By accessing them, you are putting yourself at risk of prosecution. So please stick to the official streaming platforms.

Still thinking about it aren’t you?

If you still feel compelled to take the risk of using unauthorised streaming sites, here’s some more reasons to steer clear. Streaming sites are littered with pop ups and ads that could lead to your device being infected with viruses or malware. In addition to this, many will sneakily ask for you to download add-ons or extensions to access their content. Usually, these requests are often a disguise for installing adware onto your device. So guys seriously, it isn’t worth the risk.

Stay Protected

Wherever you choose to do your streaming this summer, it’s critical that you have up to date antivirus/anti-spyware software and a firewall running to stop malicious programs from infecting your device. Trusted and tested software such as our award-winning Secure Home Security will prevent users from using most online streaming sites and eliminate the risks. Stay safe when streaming this summer. Please check out the McAfee Home blog for more useful content and follow @McAfee_Home for further updates etc.

The post Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/streamin-in-the-sun-your-essential-checklist-for-safely-watching-this-summers-biggest-events-online/feed/ 0
Global Community Service Day 2018: Together for good https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-community-service-day-2018-together-for-good/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-community-service-day-2018-together-for-good/#respond Mon, 21 May 2018 16:28:51 +0000 https://securingtomorrow.mcafee.com/?p=88895

By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization where I tried volleyball, basketball and other sports growing up. The keyword is ‘try,’ because, let’s face it – I was bad at sports. All coaches for the organization were – and still are – […]

The post Global Community Service Day 2018: Together for good appeared first on McAfee Blogs.

]]>

By: Emily, Communications Program Manager

When I finished college, I went to work for the same nonprofit youth sports organization where I tried volleyball, basketball and other sports growing up. The keyword is ‘try,’ because, let’s face it – I was bad at sports. All coaches for the organization were – and still are – volunteers. I’m sure they thought they were just teaching us kids how to dribble a basketball. But in actuality, I learned important life lessons: how to be a team player, the meaning of dependability, how to maintain grace when faced with challenges, and so much more. Motivated by the impact of giving back, I continued to volunteer as an adult and joined the nonprofit workforce.

When I left the nonprofit sector and joined McAfee late last year, I hoped I wouldn’t lose touch with my service-based roots. Fast-forward to Global Community Service Day, and I’m more in tune with them than ever.

All About #McAfeeGCSD

Global Community Service Day (GCSD) is an important McAfee tradition that encourages employees worldwide to step away from their desks and spread goodness to people and animal shelters, schools, food pantries, children’s charities, veterans’ services, parks, hospitals and more. This year, GCSD took extra steps to support McAfee’s mission to protect what matters by encouraging employees to participate in and teach the newly relaunched Online Safety Program. McAfee’s Online Safety Program is designed to educate and inspire children from all over the world, at every age, to learn about online safety.

When my team began working towards this special day, it was difficult for me to picture how such an event would shape up with so many people doing so many different things in so many locations. But the people of McAfee came together for good! And they came eagerly with open hearts. Across dozens of sites around the globe, with representation from all departments, my McAfee colleagues stepped up to do good by coordinating projects with their favorite charities, signing up to support the projects of others at their sites, donating needed items, and teaching McAfee’s Online Safety Program to thousands of children.

From Texas and California – to Ireland and the U.K. – over to Argentina – and all the way to Australia and India – and many more, sign-ups for service activities around the globe came pouring in. What an inspiration! Take a look at some of the photos from activities around the globe.

How My Day Shaped Up

At the Plano, Texas site (my home office) alone, there were 13 different activities benefiting even more charitable organizations to choose from. For my own GCSD experience, I chose to volunteer with Jake’s Heart, a local organization led by a very special 8-year-old boy. With several of my McAfee peers by side (next to me in an assembly line, to be exact), I went to work preparing and packaging meat and cheese sandwiches for the local homeless community. By the end, we’d packed up two huge boxes of ready-to-go sandwiches for those in need. But it went by too fast! I had so much fun helping out, that I almost rushed out to buy more bread so that we could keep the assembly going. It’s safe to say that I’m already counting down for GCSD 2019!

Wherever I go, wherever I work, keeping a heart of service will always be important to me. It’s a great feeling to be part of an organization of wonderful people who believe that ‘Together is power,’ and I’m happy to be a part of this amazing global McAfee community.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

The post Global Community Service Day 2018: Together for good appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/global-community-service-day-2018-together-for-good/feed/ 0
McAfee Safe Connect, Two Gold Award Winners of 2018 Info Security PG’s Global Excellence Awards® https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-two-gold-award-winners-2018-info-security-pgs-global-excellence-awards/ https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-two-gold-award-winners-2018-info-security-pgs-global-excellence-awards/#respond Mon, 26 Mar 2018 19:32:32 +0000 https://securingtomorrow.mcafee.com/?p=88008 On February 28th, Info Security Products Guide Global Excellence Awards presented their 2018 award winners. We are humbled to have received two golds in the Product or Service Excellence of the Year — Security Information and Website & Web Application Security for McAfee Safe Connect. Product Overview: McAfee Safe Connect is a VPN (Virtual Private Network) that helps users […]

The post McAfee Safe Connect, Two Gold Award Winners of 2018 Info Security PG’s Global Excellence Awards® appeared first on McAfee Blogs.

]]>
On February 28th, Info Security Products Guide Global Excellence Awards presented their 2018 award winners. We are humbled to have received two golds in the Product or Service Excellence of the Year — Security Information and Website & Web Application Security for McAfee Safe Connect.

Product Overview:

McAfee Safe Connect is a VPN (Virtual Private Network) that helps users create secure online connections while using the internet.  Doing so helps our customers minimize their individual security risks and helps keep their data private – especially when connecting to a public or open Wi-Fi network. Unlike home Wi-Fi, many public Wi-Fi networks (commonly offered at cafés, airports and hotels) aren’t password-protected and don’t encrypt the user data being transmitted through. Therefore, when you connect to a hotspot, your online activities from your social media activity to your online purchase history and even your bank account credentials may be wide open to hackers. With McAfee Safe Connect, you can rest assured that your information and online activities are encrypted.

McAfee has a proven record of providing security for consumers in the digital age. To address growing concerns over Wi-Fi security, we created an award-winning VPN that would keep users’ personal information secure from online threats and unsecure networks.

McAfee Safe Connect has over 1 million downloads across Google Play and the App Store with an impressive 4.3-star rating. It is available in over 20 languages to users worldwide.

Tech behemoth Samsung also chose McAfee Safe Connect VPN for their Galaxy Note 8 – Secure Wi-Fi feature and expanded collaboration with its newly announced Galaxy S9 Smartphones.

About Info Security PG’s Global Excellence Awards

Info Security Products Guide sponsors the Global Excellence Awards and plays a vital role in keeping individuals informed of the choices they can make when it comes to protecting their digital resources and assets. The guide is written expressly for those who wish to stay informed about recent security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow’s technology today, best deployment scenarios, people and technologies shaping cyber security and industry predictions & directions that facilitate in making the most pertinent security decisions. Visit www.infosecurityproductsguide.com for the complete list of winners.

We are proud of recognition given to McAfee Safe Connect, which aims to safeguard every Internet user’s online privacy. Please check out our award-winning Wi-Fi Privacy VPN product: McAfee Safe Connect.

Interested in learning more about McAfee Safe Connect and mobile security tips and trends? Follow @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

The post McAfee Safe Connect, Two Gold Award Winners of 2018 Info Security PG’s Global Excellence Awards® appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-two-gold-award-winners-2018-info-security-pgs-global-excellence-awards/feed/ 0
McAfee Safe Connect RT2Win Sweepstakes Terms and Conditions https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-rt2win-terms-conditions/ https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-rt2win-terms-conditions/#respond Mon, 26 Mar 2018 19:00:34 +0000 https://securingtomorrow.mcafee.com/?p=87801 Just a few weeks back, Info Security Products Guide awarded McAfee Safe Connect with two Gold-Level Global Excellence Awards for Product or Service Excellence of the Year – Security Information and Website & Web Application Security! To celebrate, we’re treating you to a #RT2Win Sweepstakes on the @McAfee_Home Twitter handle. Ten [10] lucky winners of […]

The post McAfee Safe Connect RT2Win Sweepstakes Terms and Conditions appeared first on McAfee Blogs.

]]>
Just a few weeks back, Info Security Products Guide awarded McAfee Safe Connect with two Gold-Level Global Excellence Awards for Product or Service Excellence of the YearSecurity Information and Website & Web Application Security!

To celebrate, we’re treating you to a #RT2Win Sweepstakes on the @McAfee_Home Twitter handle. Ten [10] lucky winners of the Sweepstakes drawing will receive a one-year free subscription of McAfee Safe Connect to provide security and privacy across your PC, iOS, and Android devices when connecting to Wi-Fi hotspots and private networks.

All you have to do is simply retweet one of our contest tweets between March 26, 2018 – April 17, 2018 for your chance to win. Sweepstake tweets will include “#McAfeeSafeConnect, #RT2Win, and #Sweepstakes”. Terms and conditions below.

#McAfeeSafeConnect #RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Monday, March 26. This tweet will include the hashtags: #McAfeeSafeConnect, #RT2Win, and #Sweepstakes.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #McAfeeSafeConnect AND #RT2Win hashtags must be included to be entered.
  • Winners will be notified on Wednesday, April 18, 2018 via Twitter direct message.
  • Limit one entry per person.

How to Win:

Retweet one of our contest tweets on @McAfee_Home that include “#RT2Win, #Sweepstakes, and #McAfeeSafeConnect” for a chance to win a one-year free subscription to McAfee Safe Connect. Ten [10] total winners will be selected and announced on April 18, 2018. Winners will be notified by direct message on Twitter. For full Sweepstakes details, please see the Terms and Conditions, below.

McAfee Safe Connect #RT2Win Sweepstakes Terms and Conditions

How to Enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee Safe Connect #RT2Win Sweepstakes will be conducted from March 26, 2018 through April 17, 2018. All entries for each day of the McAfee Safe Connect #RT2Win Sweepstakes must be received during the time allotted for the McAfee Safe Connect #RT2Win Sweepstakes. Pacific Daylight Time shall control the McAfee Safe Connect #RT2Win Sweepstakes. The McAfee Safe Connect #RT2Win Sweepstakes duration is as follows.

McAfee Safe Connect #RT2Win Sweepstakes Duration:

  • Begins Monday, March 26, 2018­­ at 12:00pm PST
  • Ends: Tuesday, April 17, 2018 at 12:00am PST
  • Ten [10] winners will be announced: Wednesday, April 18th

For the McAfee Safe Connect #RT2Win Sweepstakes, participants must complete the following steps during the time allotted for the McAfee Safe Connect #RT2Win Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags: #RT2Win, #Sweepstakes, and #McAfeeSafeConnect.
  2. Retweet the sweepstakes tweet of the day and make sure it includes the #RT2Win, #Sweepstakes, and #McAfeeSafeConnect hashtags.
  3. Note: Tweets that do not contain the #RT2Win, #Sweepstakes, and #McAfeeSafeConnect hashtags will not be considered for entry.
  4. Limit one entry per person.

Ten [10] winners will be chosen for the McAfee Safe Connect #RT2Win Sweepstakes tweet from the viable pool of entries that retweeted and included #RT2Win, #Sweepstakes, #McAfeeSafeConnect. McAfee and the McAfee social team will choose winners from all the viable entries. The winners will be announced and privately messaged on April 18, 2018 on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes.   

Eligibility: 

McAfee Safe Connect #RT2Win Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee Safe Connect #RT2Win Sweepstakes begins and live in a jurisdiction where this prize and McAfee Safe Connect #RT2Win Sweepstakes are not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

Winner Selection:

Winners will be selected at random from all eligible retweets received during the McAfee Safe Connect #RT2Win Sweepstakes drawing entry period. Sponsor will select the names of ten [10] potential winners of the prizes in a random drawing from among all eligible submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee Safe Connect #RT2Win Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by April 18th. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten [10] days of written notification, or prize may be forfeited, and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty-four [24] hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

Prizes: 

The prize for the McAfee Safe Connect #RT2Win Sweepstakes is a one-year free subscription to McAfee Safe Connect. Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Safe Connect #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Safe Connect #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

General Conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee Safe Connect #RT2Win Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee Safe Connect #RT2Win Sweepstakes entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee Safe Connect #RT2Win Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee Safe Connect #RT2Win Sweepstakes-related activity, or participation in the McAfee Safe Connect #RT2Win Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with these prize McAfee Safe Connect #RT2Win Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee Safe Connect #RT2Win Sweepstakes.

Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee Safe Connect #RT2Win Sweepstakes and all matters or disputes arising from the McAfee Safe Connect #RT2Win Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with these sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of Delaware.

Privacy Policy: 

Personal information obtained in connection with this prize McAfee Safe Connect #RT2Win Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html.

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after March 26th 2018 and before April 17th 2018 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this link or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA

The post McAfee Safe Connect RT2Win Sweepstakes Terms and Conditions appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mcafee-safe-connect-rt2win-terms-conditions/feed/ 0
How Do You #PressForProgress? https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-do-you-pressforprogress/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-do-you-pressforprogress/#respond Thu, 08 Mar 2018 22:16:19 +0000 https://securingtomorrow.mcafee.com/?p=85200

By Marty, Regional Sales Director March 8th marks the 108th year the world has celebrated International Women’s Day. During those years women won the right to vote, according to the Department of Labor women now account for 47% of the US workforce and control over $20 trillion in worldwide spending[1]. Still, recent reports indicate economic […]

The post How Do You #PressForProgress? appeared first on McAfee Blogs.

]]>

By Marty, Regional Sales Director

March 8th marks the 108th year the world has celebrated International Women’s Day. During those years women won the right to vote, according to the Department of Labor women now account for 47% of the US workforce and control over $20 trillion in worldwide spending[1]. Still, recent reports indicate economic gender equality is nearly 200 years away[2].  Others estimate we won’t reach pay equity for another 101 years[3].

The theme of International Women’s Day this year is #PressForProgress. It is an appropriate theme as the push for women’s equality around the world, at all levels, is far from complete.

A Teacher’s Influence on My Life

When I think about how we #PressForProgress, I think of teachers. During a recent conversation with a colleague about the people who have had the greatest impact on our lives, we both kept coming back to our teachers. In high school, I was lucky to take Latin with Mrs. Buckner all four years. Mrs. Buckner was a total motivator, in her kind, funny way. During my sophomore year, she had me run in the “chariot race” as the 4th “wheel” in a group of the three fastest sprinters at our school. I don’t think “intimidated” is a strong enough word to express how I felt! I did it and we won against 40 other schools! I’m still not sure how I kept up. In my senior year, she encouraged me to run for President of the Latin Club. Mrs. Buckner helped me understand how it would expand my leadership skills and later made sure to highlight it when she wrote my college recommendation letter. With her influence, I ran for office at the state level the next year. Mrs. Buckner was first in line to celebrate me when I did well, but would also call me out when I wasn’t giving my best. She took an interest in my development, helping me get where I wanted to be. She pushed me to recognize I was capable of so much more than I believed. Even now when I wonder if I can push through the week or solve a customer issue I remember her telling me before the chariot race in Chapel Hill to “just keep running.” As I stepped into my first role in sales leadership I often felt like a fraud. Like people would eventually figure out I didn’t have all the answers, that I didn’t always know what know what our next move should be. It was then I remembered what Mrs. Buckner told me when I was President of Latin Club “it’s not always about knowing what to do, it’s caring enough to do it and knowing who to ask for help.” Sometimes pressing for progress is as simple as encouraging another to try, sometimes it’s reminding someone what she is capable of even when she doesn’t believe it herself. It’s always about caring enough to try.

The Value of a Mentor

When I first entered the cybersecurity field I was 25 years old and lacked the 10-15 years of experience required of a security product sales specialist. Then another teacher entered my life. My mentor and friend Rich.  Rich devised a training curriculum for me to study for and pass the CISSP exam within a year. He taught me the fundamentals of security sales and even some of the soft skills associated with influencing coworkers to also position my products, not to mention helping me earn some credibility (note: the secret is thorough preparation). Combining the lessons in rising to the challenge and leading my own peers that Mrs. Buckner had instilled in me, with the mentoring skills of Rich was a recipe for success. When I asked Rich why he was taking me on as a project his answer was simple: “Marty, I have two daughters. I want them to have a bright future where they can pursue any opportunity. The best way for me to make that happen is to help create more female leaders.” 13 years later not only am I one of those leaders, Rich is now a key contributor on my team!

Pressing for Progress at McAfee

At McAfee, we #PressforProgress by giving our female employees opportunities to teach, to learn, guide, and to help each other grow. McAfee has a history of investing in women. Women in Security (WISE) was founded in 2012 as an organization committed to and engaged in supporting the growth, empowerment, and success of women at McAfee. WISE is a global network of men and women who actively support women in their efforts to thrive in the workplace. WISE has expanded from one chapter in Plano to across the globe and remains a key investment area by McAfee. I myself have been a member since 2015 and am proud to currently serve as President. Today 1,000+ employees worldwide engage in over 70 events each year focused on development, networking, and strengthening our communities.

We #PressForProgress in many ways here at McAfee. Look no further than our C-suite with 33% of our board made up of women, including Chatelle Lynch, Chief Human Resources Officer; Dawn Smith, Chief Legal Counsel; Allison Cerra, Chief Marketing Officer. Diversity and Inclusion is part of our culture and our DNA. We recognize as an organization that our success is tied to how each and every single one us continue to #PressForProgress in everything that we do. Whether it’s how we recruit, how we recognize and celebrate employee contributions, or how we grow and develop our future rock stars and employees. We each have a part to play.

Perhaps you are a teacher like Mrs. Buckner or an activist parent like Rich who is already helping the next generation of women become leaders, or maybe you yourself are a leader in your organization guiding others on their career path. You can and do #PressforProgress each day. As you celebrate International Women’s Day —whether you join one of the many celebrations around the world or take a minute to post a photo tagged #PressForProgress– by intentionally pressing for progress you help women of the world, of your world, reach gender equity much sooner than any report can predict.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now!

[1] https://girlpowermarketing.com/statistics-purchasing-power-women/

[2] World Economic Forum Global Gender Gap report http://reports.weforum.org/global-gender-gap-report-2016/

[3] https://www.aauw.org/research/the-simple-truth-about-the-gender-pay-gap/

The post How Do You #PressForProgress? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/how-do-you-pressforprogress/feed/ 0
McAfee Employees Share How They #PressForProgress on International Women’s Day https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-share-pressforprogress-international-womens-day/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-share-pressforprogress-international-womens-day/#respond Wed, 07 Mar 2018 19:33:55 +0000 https://securingtomorrow.mcafee.com/?p=85097

By Karla, Digital Media Specialist During the month of March, we’re excited to support International Women’s Day (March 8) and Women’s History Month. At McAfee, we recognize the power of an inclusive and diverse culture and are proud to celebrate the achievements of our trailblazing female colleagues worldwide. And of course, no group is more […]

The post McAfee Employees Share How They #PressForProgress on International Women’s Day appeared first on McAfee Blogs.

]]>

By Karla, Digital Media Specialist

During the month of March, we’re excited to support International Women’s Day (March 8) and Women’s History Month. At McAfee, we recognize the power of an inclusive and diverse culture and are proud to celebrate the achievements of our trailblazing female colleagues worldwide. And of course, no group is more passionate about doing so than our Women in Security (WISE) Community.

WISE is a global network committed to supporting the growth, empowerment, and success of women at McAfee. As part of this year’s International Women’s Day call to action, our WISE community are leading by example and sharing their own #PressForProgress moments to help inspire and encourage others in their careers.

See some of the examples below and submit your own #PressForProgress moments in the comment box below!

#PressForProgress at McAfee

Lisa Depew Industry and Academic Outreach (US)

“Having spent 20 years in engineering design, validation, operations, and customer enabling, I am passionate about how technology can help transform lives. I #PressForProgress by engaging industry, government, and academia on how to bring new talent, especially young girls, to careers in STEM.”

 

 

 

 

Arati SankheDirector, Software Engineering (India)

“I #PressForProgress by remaining flexible in my career and challenging myself to look for the next opportunity to grow. In my 13 years at McAfee, I started as a software developer, moved to customer support, and then relocated from Waterloo, Canada to Bangalore to take on a new leadership opportunity.”

 

 

 

 

Rachel O’Brien – Staffing Manager (Ireland)

“Each day, I have the unique opportunity to #PressForProgress through the Cork GROW program, where I teach the techniques I learned from Personal Management Coaching courses I attended at UCC. I’ve also had the privilege to bring Ted-style talks to the WISE Cork group, enabling thought and diversity leaders to share their personal stories of challenges and successes with their coworkers.”

 

 

 

 

Silvana Ghigo – Administrative Support (Argentina)

“I #PressForProgress by leading community service and university/school events for the Cordoba office. Last year, through the efforts of our employees, we gave online safety talks to over 300 primary and high school students, donated 400 presents to kids, and volunteered over 300 hours of work on global community service day.”

 

 

 

 

Darlene Connelly – Software Sales Engineer (US)

“Since joining McAfee in 2016, I’ve been fortunate enough to share my experience as an Enterprise Technology Specialist with our customers. Each day, I get to #PressForProgress and add value to our customers through my health check findings.”

 

 

 

 

 

Tiffanie Williams – Director, Market Research (US)

“At McAfee, I’m continuously presented opportunities that challenge my limits and set new boundaries.  I #PressForProgress by consciously laying the groundwork for my successor while preparing myself for the next growth opportunity that lays before me.”

 

 

 

 

 

Bernadette Mannix – Accounting (Ireland)

“I think it’s important to share our talents with and make ourselves available to people inside and outside of work. I #PressForProgress by speaking at the WISE Cork chapter, serving as secretary of the McAfee Toastmasters, and serving underprivileged people around the world.”

 

 

 

 

Rupa Roy – Sr. Manager, Marketing (India)

“I #PushForProgress by constantly challenging myself to take on new roles. Prior to my current role as a marketing leader, I worked in several positions and took on new opportunities to grow my career at McAfee.”

 

 

 

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now.

The post McAfee Employees Share How They #PressForProgress on International Women’s Day appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-employees-share-pressforprogress-international-womens-day/feed/ 0
McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote https://securingtomorrow.mcafee.com/consumer/mcafee-ceo-chris-young-mwc-2018-keynote/ https://securingtomorrow.mcafee.com/consumer/mcafee-ceo-chris-young-mwc-2018-keynote/#respond Wed, 07 Mar 2018 02:30:28 +0000 https://securingtomorrow.mcafee.com/?p=85084 MWC 2018 came and went in the blink of an eye and new mobile innovations and exciting announcements emerged from vendors across the globe. Though we had our fair share of unique insights and innovations to share, we also had the pleasure of leading the conversation around the foundations of the digital economy, as McAfee […]

The post McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote appeared first on McAfee Blogs.

]]>
MWC 2018 came and went in the blink of an eye and new mobile innovations and exciting announcements emerged from vendors across the globe. Though we had our fair share of unique insights and innovations to share, we also had the pleasure of leading the conversation around the foundations of the digital economy, as McAfee CEO Chris Young was a keynote speaker on this topic.

The keynote dives into how the digital economy has been catalyzed by the rapid growth of mobile technologies in the hands of billions of people, and how these devices will continue to transform how we do business. Chris Young adds his unique security perspective on this phenomenon and explores how mobile applications have changed the way we live and secure our personal lives. He notes that the world is now at a precipice, and asks the important question – how can we secure a large-scale connected device ecosystem without stifling the growth and innovation of this ecosystem?

Find out his proposed answer and learn more about the state of the mobile security landscape by watching Chris’ keynote (his part starts around 33 minutes) here:

To stay up-to-date all McAfee MWC news, be sure to follow us at @McAfee and @McAfee_Home, and ‘Like’ us on Facebook.

The post McAfee CEO Chris Young Talks About the Impact of Connected Devices in MWC 2018 Keynote appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mcafee-ceo-chris-young-mwc-2018-keynote/feed/ 0
A Map of the Most Dangerous Sources of Cybercrime https://securingtomorrow.mcafee.com/business/map-dangerous-sources-cybercrime/ https://securingtomorrow.mcafee.com/business/map-dangerous-sources-cybercrime/#respond Tue, 06 Mar 2018 22:14:08 +0000 https://securingtomorrow.mcafee.com/?p=85068 This blog post was written by James Andrew Lewis, senior vice president at the Center for Strategic and International Studies (CSIS).  Now that 3 companies and 13 individuals from Russia have been indicted for U.S. election interference, the general American populace has insight into a problem that has been growing for years: Russia has little […]

The post A Map of the Most Dangerous Sources of Cybercrime appeared first on McAfee Blogs.

]]>
This blog post was written by James Andrew Lewis, senior vice president at the Center for Strategic and International Studies (CSIS). 

Now that 3 companies and 13 individuals from Russia have been indicted for U.S. election interference, the general American populace has insight into a problem that has been growing for years: Russia has little respect for the law.  In fact, based on a recent study on the Economic Impact of Cybercrime CSIS undertook with McAfee, Russia leads the world in cybercrime. This reflects both the skill of its hacker community and its disdain for western law enforcement.

The complex and close relationship between the Russian state and organized crime means that Russia provides a sanctuary for the most advanced cybercriminals, who focus on the financial sector. The best cybercriminals in the world live in Russia, and as long as they do not travel to countries where they could be arrested, they are largely immune from prosecution. For example, one of the cybercriminals who hacked Yahoo at the behest of Russian intelligence services, compromising millions of accounts and transferred the PII to the Russian government, also used the stolen data for spam and credit card fraud for personal benefit.

Yet Russia is hardly the only country specializing in cybercrime; China, North Korea, and Iran are right up there. The combination of massive budgets, access to talent and protection from law enforcement make nation-states the most dangerous source of cybercrime, which our report estimates takes about a $600 billion toll on the global economy.

Next to Russia, we believe North Korea is the next most important nation for cybercrime. Both hack banks for financial gain. In 2015-2016, for instance, a cybercrime campaign targeted dozens of banks in the SWIFT network, stealing tens of millions of dollars from banks in developing countries. The North Korean Reconnaissance General Bureau (RGB) has been linked to these attacks, which provided a lucrative way to supplement the North Korean government’s access to foreign currency.

Recognizing the difficulty of pulling off large-scale thefts from a single major western bank, the RGB targeted smaller, less sophisticated banks in developing countries like Bangladesh, Vietnam, and Ecuador. In Bangladesh, they used the victim banks’ credentials to send what looked like legitimate SWIFT fund transfer requests These requests at first appeared legitimate to the receiving banks, since they were sent from legitimate partner banks through the established channels, so in some cases, the money was transferred.

North Korea also has turned to cryptocurrency theft to help fund its regime. North Korean hackers have targeted at least three South Korean cryptocurrency exchanges in 2017. Cryptocurrencies are a particularly valuable target for North Korea, who are able to use Bitcoin’s anonymity to circumvent international sanctions. Some researchers have speculated that North Korean actors have also been involved in attempts to surreptitiously install Bitcoin mining software on hacked computers, hijacking networks of compromised systems to mine for cryptocurrencies. The Pyongyang University of Science and Technology has begun offering its computer science students classes in Bitcoin and Blockchain, confirming the growing interest in cryptocurrencies for North Korea.

Hackers in North Korea and Russia, whether affiliated with the state or not, account for much of the cybercrime that occurs in the world. Until these nation-states change their behavior, either by stopping state support for hacking or by enforcing laws against criminal hackers, cybercrime will remain a major international problem.

The post A Map of the Most Dangerous Sources of Cybercrime appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/map-dangerous-sources-cybercrime/feed/ 0
The Legacy Continues – What Black History Month Means to Us https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/legacy-continues-black-history-month-means-us/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/legacy-continues-black-history-month-means-us/#respond Fri, 09 Feb 2018 15:08:48 +0000 https://securingtomorrow.mcafee.com/?p=84317

By Karla, Digital Media Specialist At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the month of February, we are proud to celebrate Black History Month! McAfee has an ongoing commitment to creating a diverse and inclusive environment where employees have the freedom to bring their full, authentic selves to […]

The post The Legacy Continues – What Black History Month Means to Us appeared first on McAfee Blogs.

]]>

By Karla, Digital Media Specialist

At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the month of February, we are proud to celebrate Black History Month! McAfee has an ongoing commitment to creating a diverse and inclusive environment where employees have the freedom to bring their full, authentic selves to work.

This month we are featuring our McAfee African Heritage Community (MAHC). The MAHC is committed to delivering education, culture awareness, mentoring programs, community involvement and advancing diversity and inclusion within McAfee’s culture.

Get an inside look on what Black History Month means to our leaders of MAHC and how they’re continuing the legacy here at McAfee.

Living the Legacy at McAfee

Kristol, Enterprise Account Manager 

“As a child raised by parents of the 50’s, I am grateful for their sacrifice and fight for racial equality in the workplace. My mother was the first African American woman hired at one of the largest car manufacturing plants in Dallas, and my father retired from the same company after 36 years of dedicated service. As President of McAfee’s African Heritage Community, my goal is to spread knowledge of our culture to employees of all ethnicities and increase diversity while celebrating McAfee’s mission.”  

 

 

 

Philip, Program Manager of People First Office

“The celebration of Black History Month is truly a celebration of American history. There lies no separation between the two. I am proud to be a member of such a transcendent culture formed by a group of brilliant, strong, courageous, and passionate individuals whose influence has spread around the world. It is through people like my “extended work family” in the McAfee African Heritage Community that our ancestor’s legacy continues.”

 

 

 

Shellee, Sales Learning Analyst

“As an African American woman, I am on a journey to continue to break down barriers for progress for black women in corporate America. I work hard to leave the “I can too” ideology upon my daughters and those around me.  McAfee is working to make strides in the realm of diversity and I am proud to be a part of our African Heritage Community which allows me a platform to do my part in lighting a path for others.”

 

 

 

Kendrick, Customer Service

“When I study our history, I see that who we are and what we represent is pure greatness. I am grateful for the sacrifices and achievements made by our ancestors and feel empowered to carry forward that same level of greatness. Working at McAfee provides me a platform to demonstrate that greatness with my fellow African Heritage Community members and help others to learn and understand our culture.”

 

 

 

Norma, Senior Talent Acquisition Partner

“I am passionate about learning and educating employees about the history of my African heritage and the influence it has had in my life, America, and the world. I am grateful that McAfee has a culture that allows us to educate and share our unique perspectives with others about our culture and community. In educating ourselves and others, I hope to continue to influence an environment of inclusion at McAfee.”

 

 

 

Kent, Associate Technical Support Engineer 

“As a child of Trinidadian and Grenadian immigrants, my parents dream was to offer a better way of life for their future generations. I am proud to say that I am the embodiment of their dreams, and daily I am offered the opportunity to help debunk cultural stereotypes and leave a legacy for my future generations. Fostering diversity within McAfee creates relationships with people from different ethnicities and encourages compassion amongst peers and is a major part of what makes it a Great Place to Work.”

 

 

Edward, Director of Customer Success 

“I strive to be the embodiment of my ancestor’s dreams. From the bluegrass hilltops of Kentucky to the shores of Narragansett Bay in Rhode Island, I am who I am because of every struggle and every sacrifice and lesson. Their legacy continues through me…I am my brother’s keeper. McAfee’s African Heritage Community gives me the opportunity to share the wisdoms, stories, successes and trials of our culture with employees and embrace the growing diversity within McAfee.”

 

 

 

Toni, Head of People First Office

“McAfee’s mission is noble and inspired by the power of working together and uniting to overcome the greatest challenge of the digital age—cybercrime; It’s easy to lead diversity and inclusion efforts at a company committed to making the connected world more secure. My history is a legacy of dreamers, doers, and innovators who have contributed an overwhelming amount of sacrifice so that we live a secure present and future world. I’m proud to join in with McAfee’s African Heritage Community to celebrate Black History not only in February but every day.”  

 

 

Kevin, Technical Operations Manager 

“I use Black History Month as a time of reflection on all the accomplishments by people of color that have contributed to making the world a safer and more comfortable place. For example, Garrett Morgan, inventor of the traffic light, or Dr. Mark Dean, inventor of the color PC monitor and the 1st Gigahertz chip. I’m encouraged seeing the next generation understand that they too can leave a positive impact on our world regardless of race, gender, or religion.”

 

 

 

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

Interested in joining our teams? We’re hiring! Apply now.

The post The Legacy Continues – What Black History Month Means to Us appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/legacy-continues-black-history-month-means-us/feed/ 0
How to keep our kids safe online – start by talking about it https://securingtomorrow.mcafee.com/consumer/keep-kids-safe-online-start-talking/ https://securingtomorrow.mcafee.com/consumer/keep-kids-safe-online-start-talking/#respond Tue, 06 Feb 2018 10:19:33 +0000 https://securingtomorrow.mcafee.com/?p=84271 Whether or not you’re lucky enough to be a parent or grandparent, as adults we should all be concerned about the safety of children online. That’s why, on Safer Internet Day, a day dedicated to promoting the safe and positive use of digital technology for children and young people, I wanted to share some thoughts on what we can do about it. Because we all have a responsibility to look out for the generation of tomorrow.

The post How to keep our kids safe online – start by talking about it appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

Whether or not you’re lucky enough to be a parent or grandparent, as adults we should all be concerned about the safety of children online. That’s why, on Safer Internet Day, a day dedicated to promoting the safe and positive use of digital technology for children and young people, I wanted to share some thoughts on what we can do about it. Because we all have a responsibility to look out for the generation of tomorrow.

Firstly, let’s agree on a few basic truths. Today’s generation of children are unlike any that have come before them. The fortunate ones have grown up with technology all around them, and children are engaging and interacting with technology from an ever-younger age. What’s more, this isn’t always a case of stealing mum’s mobile phone, or dad’s iPad. No, much of it is technology aimed specifically at kids.

It’s not a surprise therefore that today’s generation of children are often seen glued to their phones, tablets and connected toys. And while most of this technology is incredible stuff, the unfortunate reality is that it often opens children up to a whole host of dangers. These might seem like trivialities to the younger generation, but how many children forget to inform their parents about who they are talking to online, the pages they are visiting and what they are sharing.

So what can be done about it, and how can we ensure that children are able to take advantage of the many benefits of technology, while also protecting them from its darker side? As with many things in this world, talking about it helps.

Below are some conversation starters you can use to help talk about these issues with children. These are from Safer Internet Day’s online resource, but there are lots of others out there should you want more inspiration.

Get the conversation started on a positive note:

  • Ask them what they like most about the internet and why?
  • What’s their favourite game/app/site?
  • Ask them to show you the most creative thing they’ve made online, e.g. a video they’ve made, or picture they’ve drawn.
  • Explain how the internet offers brilliant opportunities for making connections with others. Ask them who they like to keep in touch with online and what apps or services do they use?

Talk about safety:

  • Ask them what they would do if they saw that a friend online needed some help or support?
  • Ask them how they stay safe online? What tips do they have and where did they learn them?
  • Ask them to show you how to do something better or safer online.
  • Ask them to tell you what it’s okay to share online. What is it not okay to share online?
  • Do they know where to go for help, where to find safety advice and how to use safety tools on their favourite apps and games?

Discuss digital lives and wellbeing:

  • Ask them how the internet and technology makes their life better?
  • Ask how does the internet make them feel? Do different apps and games makes them feel differently?
  • Ask what could they do if being online was making them feel worse rather than better?
  • Ask them how might they know if they were using the internet and technology too much?

Talk about respect:

  • Ask what could they do if someone online was making them or someone they know feel worried or upset?
  • Who do they look up to or respect online? Why?
  • Ask them if people can say or do whatever they want online? Why / why not?
  • Ask what is different about talking online to someone compared to talking face to face? Is there anything that is the same?
  • Do they have any tips for how to be positive and show respect online?

In the hyper-connected world in which we live, it really is the responsibility of all adults to protect children online. And Safer Internet Day is the perfect opportunity to talk to your child about using the internet safely, responsibly and positively.

If you want to find out more there’s a whole host of resources to be found on the Safer Internet Day website, here: https://www.saferinternet.org.uk/advice-centre

And if you’re interested in joining the discussion on how to keep children safe online, we’ll be hosting a Twitter chat from 13:00 GMT today. You can get involved by including #SetUpSafe in your tweet.

The post How to keep our kids safe online – start by talking about it appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/keep-kids-safe-online-start-talking/feed/ 0
Your Kids Are My Problem, Here’s Why https://securingtomorrow.mcafee.com/consumer/family-safety/kids-problem-heres/ https://securingtomorrow.mcafee.com/consumer/family-safety/kids-problem-heres/#comments Thu, 01 Feb 2018 15:00:16 +0000 https://securingtomorrow.mcafee.com/?p=84042 This post was written by Jessica Brookes Snow falls outside the large steamy windows at a popular coffee shop in the suburbs of London. It’s crowded with dogs, children, people on laptops, people on mobiles and people on another planet. At a corner table, two friends are talking about how much (or how little) they […]

The post Your Kids Are My Problem, Here’s Why appeared first on McAfee Blogs.

]]>
This post was written by Jessica Brookes

Snow falls outside the large steamy windows at a popular coffee shop in the suburbs of London. It’s crowded with dogs, children, people on laptops, people on mobiles and people on another planet. At a corner table, two friends are talking about how much (or how little) they know about keeping their children safe “on devices”.  One remarks they rely on the parental settings in web browsers whilst the other confesses not to know if their mobile phone has parental controls. “Must do better”, “must look into that” is the closing sentiment but not before both do some personal admin whilst chatting; online banking for one and eBay listings for the other. The coffee shop is not unusual and neither are these parents.

According to the latest impact report from Internet Matters, the pace of change from 2013 to 2016 shows that parents’ concern increased in almost every area of online issues children face. Yet Parenting Digital Natives, also from Internet Matters, shows that only 49% of the parents surveyed had spoken to their 6-10 year olds about online safety in the last month, yet 78% of 10-12 year olds have social media accounts and online has overtaken TV with 5-15 year olds spending an average of 15 hours a week online. But what does all this research mean?

It means the children that surround us are spending more time online, potentially without adult insight into what they are doing, seeing and sharing. In contrast to television, knowing what is happening on a tablet, phone or laptop requires being involved. It also requires being educated about the risks as well as benefits of social Apps, games and websites children are frequenting. In order to facilitate information sharing and constructive discussions about how to stay safe it’s imperative, as adults, we know what we are talking about. We may not know more than our children, students, neighbours, grandchildren, nieces, nephews etc but we have an obligation to know as much as they do. If they are using the Apps we should be too; especially parents, carers and teachers. And if we can’t keep up to date on the latest, then we can ask the right questions: what are you sharing? Can you chat on it? Can you make friends on it? Can you play games on it? One area often overlooked in social media are the T&Cs. As an example, children usually think they are protected because parents are saying it’s ok. Snapchat is a favourite because the photos disappear after 24 hours, however, the terms and conditions mean that they can and are sold as stock images.

Why all the questions? The question and answer portion of my day is normally at the bequest of my eight-year-old twins, not the other way around. But I know that will change soon. And when it does I want to ensure the lines of communication are open and I know enough about what they are doing to give them practical (even if not always welcome) advice on how to stay safe online. Why then, should other adults in their life or in my community for that matter to also have enough awareness to hold an intelligent conversation with a 10-year-old about online safety? Social apps an online activity are replacing the block party/neighbourhood get together culture I grew up with. I firmly believe that as adults we all have a social responsibility for educating and keeping children safe or society will degrade to the point where the monkeys are running the zoo.

I am back in the steamy café with espresso machines hissing, groups laughing and babies gurgling. The friends conducting financial transactions over an unsecured wi-fi connection gather their things to leave. One dog barks, then another and then another. Within seconds it’s turned from a coffee shop into a rowdy kennel and all it takes is one tall human to quiet a pooch and in an equal amount of time order is restored. If each of us take the view that the small humans of today will be running the world of tomorrow it’s our responsibility to participate in what that world looks like.

Follow me on Twitter @JBroLdn
 

The post Your Kids Are My Problem, Here’s Why appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/family-safety/kids-problem-heres/feed/ 1
Why Republic Day of India Matters to Me and McAfee https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-republic-day-india/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-republic-day-india/#respond Thu, 25 Jan 2018 23:11:28 +0000 https://securingtomorrow.mcafee.com/?p=83999

By Smriti, HR Partner At McAfee, we love to recognize and celebrate the traditions and holidays observed by our employees around the world. With nearly 7,500 employees spanned across the globe, you can imagine just how many occasions we get to celebrate! This week, we happen to be celebrating one of my favorite national holidays […]

The post Why Republic Day of India Matters to Me and McAfee appeared first on McAfee Blogs.

]]>

By Smriti, HR Partner

At McAfee, we love to recognize and celebrate the traditions and holidays observed by our employees around the world. With nearly 7,500 employees spanned across the globe, you can imagine just how many occasions we get to celebrate! This week, we happen to be celebrating one of my favorite national holidays – the Republic Day of India.

Observed annually on January 26, the Republic Day of India honors the day on which India’s constitution came into effect.

Celebrating at McAfee: M-ALIVE

At McAfee India, we go BIG for Republic Day. Our M-ALIVE  Committee (Employee Engagement Committee) distributes sweets to all our employees, and then we take a moment to listen to India’s national anthem. It’s also not uncommon to see employees come to work in their finest Indian ethnic wear. Because we play to win or don’t play here at McAfee, we’ve also added a fun competition to the celebrations this year. The competition involves our teams hosting a mock political campaign where the leader must work for votes by walking the aisles and campaigning using party anthems and symbols. The leader with the most votes in the end is crowned the winner. Needless to say, this will be a good bit of fun! These types of celebrations and traditions bring back many great memories of how I celebrated Republic Day as a child.

 

 

Celebrating the Republic Day of India 

As a kid, I remember celebrating Republic Day in school. Being an army officer’s daughter, I am proud to celebrate this day and create memories with friends and families. In the army, all the officers spent the day with their soldiers and honor them for their bravery and integrity. This is followed by flag hosting, speeches and dining together.

At school, students dress in the colors of the house that they belonged to, carrying the feeling of holding the honor and integrity of the nation. I fondly remember having to be punctual and arriving at school to get started with the celebrations.

I remember the school buildings being thoughtfully decorated with flowers, buntings, pictures of heroes of the freedom movement and national flags. Sweets were distributed, a dais was raised, and loud speakers were fitted. All of this was followed by a march featuring the students, cadets, and house captains who saluted the Indian flag as they marched ahead. The school principal or the chief guest unfurled the national flag, followed by the choir singing the national anthem while all the other students joined them.

At night, the whole school was illuminated and tricolors fluttered proudly on the building. It was a sight to see! In fact, it was a day of rejoicing and merry-making that still lives with me today.

I am thankful to work for a company that honors our Indian traditions and the traditions of our diverse employee population all around the world. Being able to recognize this special day with my coworkers just like I did many years ago as a child means so much to me.

For more stories like Smriti’s follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post Why Republic Day of India Matters to Me and McAfee appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-republic-day-india/feed/ 0
How Pseudo-ransomware KillDisk Creates a Smoke Screen for Cybercriminals https://securingtomorrow.mcafee.com/business/pseudo-ransomware-killdisk-creates-smoke-screen-cybercriminals/ https://securingtomorrow.mcafee.com/business/pseudo-ransomware-killdisk-creates-smoke-screen-cybercriminals/#respond Fri, 19 Jan 2018 17:35:24 +0000 https://securingtomorrow.mcafee.com/?p=83809 We all remember Petya/NotPetya. How could you forget? The nasty malware took cues from WannaCry, leveraging the same SMB vulnerability. But instead of locking away files, Petya/NotPetya was a wiper – simply cleaning devices of their data. Petya was not the first wiper we’ve seen, and it’s certainly not the last. In fact, a classic […]

The post How Pseudo-ransomware KillDisk Creates a Smoke Screen for Cybercriminals appeared first on McAfee Blogs.

]]>
We all remember Petya/NotPetya. How could you forget? The nasty malware took cues from WannaCry, leveraging the same SMB vulnerability. But instead of locking away files, Petya/NotPetya was a wiper – simply cleaning devices of their data. Petya was not the first wiper we’ve seen, and it’s certainly not the last. In fact, a classic disk wiper is currently re-emerging in Latin America, called KillDisk, and is targeting financial firms. Once dropped on a computer, it will load itself into memory, delete its files from disk, and rename itself.

KillDisk is actually one of the most infamous malware families around. It has historically masked itself as ransomware, but is rather a very destructive wiper. Cybercriminals typically deploy it in the later stages of an infection so they can use it to hide their tracks by wiping disks and destroying forensic evidence. That’s precisely why it was paired together with the BlackEnergy malware during Telebots’ attacks on the Ukrainian power grid – so the cybercriminals could conduct their scheme with stealth.

As Christiaan Beek, lead scientist and principal engineer at McAfee claims – that’s a wiper’s bread and butter. He says, “In the past we have seen wipers being used targeting the Energy sector in the Ukraine, Oil & Gas industry in the Middle-East, Media-company and against targets in South Korea. All of these were related to regional or political conflicts.”

Destruction is clearly the end goal, but stealth is the way of getting there. Beek continues, “In 2017, we introduced the term pseudo-ransomware where destructive attacks disguised as ransomware either took down companies in a nation or were used to keep the IT-department busy while money was being transferred at the same time. Now with KillDisk, it seems that criminals do not hesitate to use it during their campaigns. Since the initial infection vector is unknown and we are lacking further samples or details, we can only speculate why they are using this.”

That’s the ultimate question – why? Is KillDisk part of a larger attack, intended to help cybercriminals avoid detection? Or are crooks extorting these financial institutions for monetary gain? As of now, we’re unsure of the motive. But we do know that as this threat continues to evolve and creates a convincing smoke screen, we all must be as vigilant as ever.

To learn more about our fight against ransomware, check out the alliance No More Ransom. And be sure to follow us at @McAfee and @McAfee_Labs.

The post How Pseudo-ransomware KillDisk Creates a Smoke Screen for Cybercriminals appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/pseudo-ransomware-killdisk-creates-smoke-screen-cybercriminals/feed/ 0
McAfee’s #RT2WIN CES Sweepstakes Terms and Conditions https://securingtomorrow.mcafee.com/consumer/mcafees-rt2win-ces-sweepstakes-terms-conditions/ https://securingtomorrow.mcafee.com/consumer/mcafees-rt2win-ces-sweepstakes-terms-conditions/#respond Tue, 09 Jan 2018 08:00:31 +0000 https://securingtomorrow.mcafee.com/?p=83633 We’re so excited to head to Las Vegas next week for CES! To celebrate, we’re giving fifteen people a chance to win a $200 Amazon Gift card. Not heading to CES this year? No problem! Simply retweet one of our contest tweets with the required hashtag between January 9th – 12th for your chance to […]

The post McAfee’s #RT2WIN CES Sweepstakes Terms and Conditions appeared first on McAfee Blogs.

]]>
We’re so excited to head to Las Vegas next week for CES! To celebrate, we’re giving fifteen people a chance to win a $200 Amazon Gift card. Not heading to CES this year? No problem! Simply retweet one of our contest tweets with the required hashtag between January 9th – 12th for your chance to win. Sweepstake tweets will include “#RT2Win, #Sweepstakes, and #McAfeeAtCES”. Terms and conditions below. 

How to Win:

Retweet one of our contest tweets on @McAfee_Home that include ““#RT2Win, #Sweepstakes, and #McAfeeAtCES” for a chance at a $200 Amazon Gift card. Fifteen [15] total winners will be selected and announced on January 16th. Winners will be posted on Twitter and notified by direct message. For full Sweepstakes details, please see the Terms and Conditions below:

McAfee #RT2Win CES Sweepstakes Terms and Conditions

How to enter: 

No purchase necessary. A purchase will not increase your chances of winning. McAfee’s #RT2Win CES Sweepstakes will be conducted from January 9th through January 12th. All entries for each day of the McAfee #RT2Winat CES Sweepstakes must be received during the time allotted for the #RT2Win CES Sweepstakes. Pacific Daylight Time shall control the McAfee #RT2Win CES Sweepstakes. The McAfee #RT2Win CES Sweepstakes duration is as follows.

#RT2Win CES Sweepstakes:

  • Tuesday, January 9th­­ – Friday, January 12th
    • Sweepstake duration: Starts January 9th at 1pm PST & Ends January 12th at 12am PST
  • Fifteen [15] winners will be announced: Tuesday, January 16th

For the McAfee #RT2Win CES Sweepstakes, participants must complete the following steps during the time allotted for the McAfee #RT2Win CES Sweepstakes:

  1. Find the sweepstakes tweet of the day posted on @McAfee_Home which will include the hashtags “#RT2Win, #Sweepstakes, and #McAfeeAtCES”.
  2. Retweet the sweepstakes tweet of the day and make sure it includes the hashtags

Fifteen [15] winners will be chosen for the McAfee #RT2Win CES Sweepstakes tweet from the viable pool of entries that retweeted and included #McAfeeCESSweepstakes. McAfee and the McAfee social team will select winners at random from among the viable entries. The winners will be announced and privately messaged on January 16th on the @McAfee_Home Twitter handle. No other method of entry will be accepted besides Twitter. Only one entry per user is allowed, per Sweepstakes. SWEEPSTAKES IS IN NO WAY SPONSORED, ENDORSED, ADMINISTERED BY, OR ASSOCIATED WITH TWITTER, INC.

Eligibility: 

McAfee’s #RT2Win CES Sweepstakes is open to all legal residents of the 50 United States who are 18 years of age or older on the dates of the McAfee #RT2Win CES Sweepstakes begins and live in a jurisdiction where this prize and McAfee #RT2Win CES Sweepstakes are not prohibited. Employees of Sponsor and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.

Winner Selection:

Winners will be selected from the eligible entries received during the days of the McAfee #RT2Win CES Sweepstakes periods. Sponsor will select the names of fifteen [15] potential winners of the prizes in a random drawing from among all eligible Submissions at the address listed below. The odds of winning depend on the number of eligible entries received. By participating, entrants agree to be bound by the Official McAfee #RT2Win CES Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects.

Winner Notification: 

Each winner will be notified via direct message (“DM”) on Twitter.com by January 16th. Prize winners may be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within ten (10) days of written notification, or prize may be forfeited and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within twenty four (24) hours from the first DM notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

Prizes: 

The prize for the McAfee #RT2Win CES Sweepstakes is a $200 Amazon e-gift card (approximate retail value “ARV” of the prize is $200 USD; the total ARV of all gift cards is $3,000 USD). Entrants agree that Sponsor has the sole right to determine the winners of the McAfee #RT2Win CES Sweepstakes and all matters or disputes arising from the McAfee #RT2Win CES Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor. Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the prize winners’ sole responsibility.

General conditions: 

Entrants agree that by entering they agree to be bound by these rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the prizewinner. Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the McAfee #RT2Win CES Sweepstakes, or by any technical or human error, which may occur in the processing of the McAfee #RT2Win CES Sweepstakes entries. By entering, participants release and hold harmless Sponsor and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the McAfee #RT2Win CES Sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any McAfee #RT2Win CES Sweepstakes -related activity, or participation in the McAfee #RT2Win CES Sweepstakes. Except for applicable manufacturer’s standard warranties, the prizes are awarded “AS IS” and WITHOUT WARRANTY OF ANY KIND, express or implied (including any implied warranty of merchantability or fitness for a particular purpose).

If participating in this Sweepstakes via your mobile device (which service may only be available via select devices and participating wireless carriers and is not required to enter), you may be charged for standard data use from your mobile device according to the terms in your wireless service provider’s data plan.  Normal airtime and carrier charges and other charges may apply to data use and will be billed on your wireless device bill or deducted from your pre-paid balance.  Wireless carrier rates vary, so you should contact your wireless carrier for information on your specific data plan.

Limitations of Liability; Releases:

By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

To the fullest extent permitted by applicable law, in no event will the sponsor or the released parties be liable for any special, indirect, incidental, or consequential damages, including loss of use, loss of profits or loss of data, whether in an action in contract, tort (including, negligence) or otherwise, arising out of or in any way connected to your participation in the sweepstakes or use or inability to use any equipment provided for use in the sweepstakes or any prize, even if a released party has been advised of the possibility of such damages.

  1. To the fullest extent permitted by applicable law, in no event will the aggregate liability of the released parties (jointly) arising out of or relating to your participation in the sweepstakes or use of or inability to use any equipment provided for use in the sweepstakes or any prize exceed $10. The limitations set forth in this section will not exclude or limit liability for personal injury or property damage caused by products rented from the sponsor, or for the released parties’ gross negligence, intentional misconduct, or for fraud.
  2. Use of Use of Winner’s Name, Likeness, etc.: Except where prohibited by law, entry into the Sweepstakes constitutes permission to use your name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation (including in a public-facing winner list).  As a condition of being awarded any prize, except where prohibited by law, winner may be required to execute a consent to the use of their name, hometown, aural and visual likeness and prize information for advertising, marketing, and promotional purposes without further permission or compensation. By entering this Sweepstakes, you consent to being contacted by Sponsor for any purpose in connection with this Sweepstakes.

Prize Forfeiture:

If winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with these prize McAfee #RT2Win CES Sweepstakes rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entry forms for each McAfee #RT2Win CES Sweepstakes.

Dispute Resolution:

Entrants agree that Sponsor has the sole right to determine the winners of the McAfee #RT2Win CES Sweepstakes and all matters or disputes arising from the McAfee #RT2Win CES Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of Sponsor.

Governing Law & Disputes:

Each entrant agrees that any disputes, claims, and causes of action arising out of or connected with this sweepstakes or any prize awarded will be resolved individually, without resort to any form of class action and these rules will be construed in accordance with the laws, jurisdiction, and venue of New York.

Privacy Policy: 

Personal information obtained in connection with this prize McAfee Day #RT2Win CES Sweepstakes will be handled in accordance policy set forth at http://www.mcafee.com/us/about/privacy.html

  1. Winner List; Rules Request: For a copy of the winner list, send a stamped, self-addressed, business-size envelope for arrival after January 16th 2017 and before January 16th 2018 to the address listed below, Attn: #RT2Win at CES Sweepstakes.  To obtain a copy of these Official Rules, visit this or send a stamped, self-addressed business-size envelope to the address listed in below, Attn: Sarah Grayson. VT residents may omit return postage.
  2. Intellectual Property Notice: McAfee and the McAfee logo are registered trademarks of McAfee, LLC. The Sweepstakes and all accompanying materials are copyright © 2018 by McAfee, LLC.  All rights reserved.
  3. Sponsor: McAfee, LLC, Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA

 

The post McAfee’s #RT2WIN CES Sweepstakes Terms and Conditions appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mcafees-rt2win-ces-sweepstakes-terms-conditions/feed/ 0
Three Lessons I’ve Learned Battling Cancer and Cybercriminals https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/3-lessons-ive-learned-battling-cancer-cybercriminals/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/3-lessons-ive-learned-battling-cancer-cybercriminals/#respond Sat, 06 Jan 2018 00:05:30 +0000 https://securingtomorrow.mcafee.com/?p=83572

By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal Engineer, a Ph.D. in engineering, and the most senior female technical lead at McAfee, some might say my job is complicated and technical. But I believe we at McAfee are all technical, no matter the […]

The post Three Lessons I’ve Learned Battling Cancer and Cybercriminals appeared first on McAfee Blogs.

]]>

By Celeste, Senior Principal Engineer

With our people at the heart, we are McAfee

As Chief Data Scientist, Senior Principal Engineer, a Ph.D. in engineering, and the most senior female technical lead at McAfee, some might say my job is complicated and technical. But I believe we at McAfee are all technical, no matter the field or position. In fact, any marketing or human resource strategy leaves me glazed over with awe, trying to understand that which I will likely never completely grasp in those fields. The common underlying fundamental we do have in all of these areas, however, is our resolve to make the world a safer place for our families, our children and our communities. We all play a vital role in the battle against cybercriminals.

My story just so happens to involve two battles—one against cybercriminals and the other against cancer—which have both shaped my career at McAfee and my personal life at home. Let me share how these worlds have collided and three lessons I’ve learned along the way.

1. Balancing home and work life is key for a healthy you

As a metastatic breast cancer survivor, I appreciate the precarious balance of home and work. While in remission (two years and counting), I’m still subjected to maintenance chemotherapy every three weeks that pulls the rug out from under me. The nightly side effects are brutal and require additional medication that – you guessed it – have even more side effects. It’s a never-ending cycle, and I will likely be on the maintenance chemo the rest of my life. Thankfully, I have a great support team at home and within a Facebook-post away. I believe that has helped me keep a positive outlook and strengthened my grit to beat the disease. The same is true at McAfee. Even though I work remotely, I have a great connection with my manager and team. Because I have the full support and trust of my manager, I can easily balance my work priorities at McAfee and the day-to-day things that are important – like my chemotherapy treatment.

2. Tenaciousness and determination will drive you to success

Adding to the attributes for juggling home and work are tenaciousness and determination.  These qualities have been key in my battle against cancer, as well as my 38-year career in tech. I can single-handedly drive an oncologist insane with my never-ending questions about my care. And I suspect that I do the same thing with anyone speaking analytics with me! You’ll find this type of mentality throughout McAfee; it’s through our passion, curiosity, and tenacity that we unite and remain laser focused on keeping people protected.

At home and work, I bring the same perseverance that has guided me throughout my life. As I pursued my graduate studies, my professors would say, “Celeste is like a dog with a bone.” If you believe in something, I think it is important to resolutely pursue it, just like a dog after a bone. While it took seven years to complete my Masters and nine years for my Ph.D., I never let go of the dream and was determined as I could be in everything I pursued.

3. Never stop learning

The cybersecurity world has brought my work and my passion under one roof. While I have applied analytics for nearly four decades to many markets outside of the cybersecurity industry, having that experience has helped me to think of new approaches to security. I also have great colleagues that teach me security nuances as well as those analytic skills I’m not familiar with; I believe it is important to surround yourself with very smart people and, at McAfee, there is no shortage!

Sometimes my passion and work-life balance falters. Sometimes the analytic model doesn’t work. And at times, sitting in the chemo chair drains my energy and resolve. It is then I reach out to those around me to give me a dose of reality. I continue to learn about security and analytics. I continue to be in remission. I constantly remind folks to get their mammograms. I chew on that next set of security data. I work at beating the bad guy every day, whether it be cancer or cybercriminals. It typically brings my perspective back into focus, and my positivity, tenacity, and determination return. Whether it be at home or at work, each comes with a choice to be passionate and be the best we can be, fighting for what’s right for our health or what’s right in security. I, for one, am very fortunate that my worlds collide at McAfee!

For more stories like Celeste’s, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post Three Lessons I’ve Learned Battling Cancer and Cybercriminals appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/3-lessons-ive-learned-battling-cancer-cybercriminals/feed/ 0
The Year Cybersecurity Made Primetime https://securingtomorrow.mcafee.com/business/year-cybersecurity-made-primetime/ https://securingtomorrow.mcafee.com/business/year-cybersecurity-made-primetime/#respond Tue, 26 Dec 2017 18:00:55 +0000 https://securingtomorrow.mcafee.com/?p=83382 Grey-Sloan Memorial Hospital, the fictional hospital on the television drama “Grey’s Anatomy,” was suddenly brought to a halt Nov. 14 at the hands of ransomware. The No. 3 drama on broadcast television, a venerable franchise of 14 seasons and 300 episodes, reflected the harsh reality faced by many. WannaCry, Petya, and Equifax entered dinner table […]

The post The Year Cybersecurity Made Primetime appeared first on McAfee Blogs.

]]>
Grey-Sloan Memorial Hospital, the fictional hospital on the television drama “Grey’s Anatomy,” was suddenly brought to a halt Nov. 14 at the hands of ransomware. The No. 3 drama on broadcast television, a venerable franchise of 14 seasons and 300 episodes, reflected the harsh reality faced by many. WannaCry, Petya, and Equifax entered dinner table conversation and late-night talk show monologues. In 2017 cybercrime made primetime.

Shonda Rhimes, creator of “Grey’s Anatomy,” tweets about ransomware hits Grey-Sloan Memorial

The events that transpired this year put cybersecurity on everyone’s mind. The stories of ransomware and malware found their way into homes, schools, and businesses – everyday life.

The Attacks That Changed Everything

In May, the ransomware WannaCry took center stage. True to its name, WannaCry was worth its weight in tears: 150 countries impacted, 250,000 machines infected, 16 United Kingdom medical centers taken down, all in just one day. The ransom was paid, and expert analysis ensued. The motive: disruption. As Raj Samani, Chief Scientist at McAfee stated: “The game has changed. The reality is that any organization can hire someone to disrupt a competitor’s business operations for less than the price of a cup of coffee.”

Taking cues from WannaCry, the Petya/NotPetya malware emerged a month later as its successor. The next global cyberattack leveraged the same vulnerability, but was nastier when infecting systems. Instead of locking away files and extorting money from victims, Petya/NotPetya was a wiper – deleting all files from affected devices.

The threat landscape was not just populated by cyberattacks, but also a data breach deemed the worst in recent memory. The Equifax breach exposed crucial personal identification of roughly 143 million consumers in the United States. This data included names, addresses, birthdates, driver’s license data and Social Security numbers. “We need to view the Equifax breach as a catalyst moment for rethinking the way we handle identification for U.S. citizens,” said Steve Grobman, senior vice president and chief technology officer for McAfee.

Rethink we did. These attacks, and other notable ones such as Bad Rabbit, the Uber data breach, the KRACK Wi-Fi attack, and more, changed how the cybersecurity industry responds to threats.

Cause and Effect

These attacks moved the needle. Cybercriminals were upping their game. These attacks mandated that cybersecurity must be faster, smarter, and more effective. Christiaan Beek, lead scientist and principal engineer at McAfee, says our improved response time to ransomware attacks confirms that’s happening: “The cybersecurity world is indeed responding faster than before, especially after WannaCry, which was another wake-up call… The moment researchers see that a decryptor is available, we go on and continue to hunt down the next one or learn from the previous ones and start innovating or fine-tuning our products.”

Looking Ahead

Now that cybersecurity is on prime time, what happens? We’re paying attention. Does that mean we’re prepared?

McAfee Chief Executive Officer Chris Young thinks we still have a ways to go. “It’s nearly 2018. And from the discussions I have weekly, it’s clear that business leaders understand far more about the risk of cyber threats today than they did even a few years ago. However, so many business leaders I talk to still want to know if they’re doing everything they can to protect their companies. Answer: They’re not.”

Young recommends a “Culture of Security” –– a paradigm shift in philosophy and approach from the executive boardroom to new employees on their first day. Leaders must demonstrate a new priority, whether it’s impeccable password and virtual private network use, or cloud computing adoption only under the guidance of cybersecurity professionals. “Businesses need to think security first,” Young says. “Whether that’s in designing new products and services, signing partnership agreements, in hiring new employees, or anything else.”

Malware is not the star of the show. It’s the villain, but a powerful one. Cybersecurity must adapt to address it. McAfee wrapped up 2017 by announcing the upcoming acquisition of cloud provider Skyhigh Networks, which will become part of the McAfee Cloud Security Business Unit. Skyhigh will join a McAfee portfolio that includes market-leading products in the endpoint and security operations center (SOC). Partnering in an open ecosystem pulls these major strengths together in a new and agile way.

Welcome, 2018. New tools and a new “Culture of Security” are ready to take on new threats.

The post The Year Cybersecurity Made Primetime appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/year-cybersecurity-made-primetime/feed/ 0
How the IoT supports the world’s largest industries https://securingtomorrow.mcafee.com/consumer/iot-supports-worlds-largest-industries/ https://securingtomorrow.mcafee.com/consumer/iot-supports-worlds-largest-industries/#respond Tue, 19 Dec 2017 12:30:29 +0000 https://securingtomorrow.mcafee.com/?p=83330 This blog post was written by Nick Viney. The Internet of Things (IoT) has already helped to connect our world in so many ways, bringing huge improvements and convenience to our lives, homes and health. But we’re often guilty of taking it for granted and failing to celebrate the many ways in which being connected […]

The post How the IoT supports the world’s largest industries appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

The Internet of Things (IoT) has already helped to connect our world in so many ways, bringing huge improvements and convenience to our lives, homes and health. But we’re often guilty of taking it for granted and failing to celebrate the many ways in which being connected supports some of the world’s largest industries, such as transport, agriculture, manufacturing and even the cities in which we live. With around half of the world’s population now online and discovering more and more sectors are turning to tech everyday, I thought it would be a perfect time to highlight some of the fundamental changes IoT has made society what it is today.

Agriculture

Farmers are increasingly using their smartphones for new techniques that improve the production of livestock and field activity – also known as ‘agritech’. This includes looking after the health of cattle, analysing grazing time, and even water consumption through sensor-fitted collars. These can even alert farmers when they sense motions associated with labour from pregnant cattle. Meanwhile, organisations like the Wildlife Conservation Society are monitoring endangered species prone to poaching activities through the use of motion-sensing cameras.  

Not only are they finding that IoT minimises their operational costs, but also allows them to achieve better results. For example, harmful pesticides and extreme weather conditions that could have adverse effects on crops can be detected in advance – This way a course of action can be put in place.

Climate and environment

Networking and telecommunications company Ericsson claims that the footprint of IoT could help cut up to 63.5 gigatons of greenhouse gas emissions by 2030. Whilst The International Telecommunication Union predicted that rural areas and developing countries will evolve the way they access electricity and the internet thanks to smarter energy saving solutions.  

Various organisations are already providing smarter solutions for protecting the planet, for example, San Franciscan startup, Rainforest Connection, enhanced the protection of forests vulnerable to deforestation including Indonesia and the Amazon. This was achieved by transforming mobile phones into solar-powered listening devices attached to the trees, these are set to alert rangers if they sense the sound of a chainsaw from over a kilometre away. Other examples can be seen through IBM’s China Research Lab and London’s Pigeon Air Patrol, which are scaling up the quality of the city’s air through a forecasting system that monitors pollution levels in different neighbourhoods.   

Transport

In many ways, it feels as though the transport industry has long used IoT, thanks to technologies like sensor street lights, speed cameras, and Sat Navs which have been commonplace since 2013. And the innovation hasn’t stopped there – we’re continuing to see plenty of movement in the space, for example, Transport for London (TfL) supports approximately 21 million commuter trips each day – and has predicted that the city will be populated by a total of 10 million people by 2030. It’s no wonder the introduction of Oyster cards in 2003 was a huge success, later to be replaced by a contactless payment system that today accounts for more than one billion journeys. We later saw London’s iconic red buses also go green in 2014 with the introduction of wirelessly charging hybrid buses. Similarly, car manufacturers such as Mercedes, BMW, and Tesla all have plans to launch driverless cars in the near future, with predictions that 10 million self-driving cars will be on the road by 2020.

Although it’s interesting to see the how IoT has become so widespread and had such a massive impact on various industries and people’s lives, it’s almost natural to forget the dangers and risks that come with it or envisage a time when we managed without it. As more and more industries take advantage of the benefits offered by IoT, poorly secured devices pose a growing risk. For this reason we need to remember that all devices need to be protected with secure networks and the latest software. In the age of the internet of things, this will be more important than ever.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post How the IoT supports the world’s largest industries appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/iot-supports-worlds-largest-industries/feed/ 0
Cybercriminals Capitalize on Bitcoin’s Boom, Attack Mining Marketplace NiceHash https://securingtomorrow.mcafee.com/business/cybercriminals-capitalize-bitcoins-boom-attack-mining-marketplace-nicehash/ https://securingtomorrow.mcafee.com/business/cybercriminals-capitalize-bitcoins-boom-attack-mining-marketplace-nicehash/#respond Wed, 13 Dec 2017 18:10:06 +0000 https://securingtomorrow.mcafee.com/?p=83208 We’re seeing it everywhere: Bitcoin is booming. The cryptocurrency’s value has shot up 181 percent the past month. Everyone seems to be scurrying to get in on the newest gold rush – especially cybercriminals. Last week, hackers carried out a “professional” attack against Slovenian-based bitcoin mining marketplace NiceHash intended to capitalize on this trend. By conducting […]

The post Cybercriminals Capitalize on Bitcoin’s Boom, Attack Mining Marketplace NiceHash appeared first on McAfee Blogs.

]]>
We’re seeing it everywhere: Bitcoin is booming. The cryptocurrency’s value has shot up 181 percent the past month. Everyone seems to be scurrying to get in on the newest gold rush – especially cybercriminals. Last week, hackers carried out a “professional” attack against Slovenian-based bitcoin mining marketplace NiceHash intended to capitalize on this trend. By conducting an advanced attack on the organization, cybercriminals were able to steal approximately 4,700 bitcoins ($63.92 million dollars).

Beyond the staggering monetary amount, details about the attack are still emerging. Here’s what we do know: a hacker or a group of hackers was able to infiltrate NiceHash’s system through a compromised company computer. The NiceHash head of marketing Andrej P. Škraba has stated this was “a highly professional attack with sophisticated social engineering.”

NiceHash is collaborating with law enforcement as “a matter of urgency.” It briefly suspended operations, with its website still inactive at this time. It also urges users to change their passwords in the meantime until more details are revealed.

The biggest takeaway from this attack isn’t just for NiceHash users, however, as it acts an important reminder for all those eager to get involved in the cryptocurrency market. With the world’s reshaped focus on Bitcoin, the market for cryptocurrency will be caught between growth and security. As cryptocurrency marketplaces and exchanges surge in popularity, the targets on their backs will widen. Given they act as digital wallets, cryptocurrency organizations essentially double as a one-stop shop for cybercriminals wishing to line their pockets. They don’t have to encrypt and extort as with ransomware, or sell stolen info to third party data warehouses – they just have to hack one marketplace to potentially get their hands on millions of dollars.

It’s crucial NiceHash and all other cryptocurrency organizations prioritize online security immediately. That means extending the right solutions and training from the top down; supplying employees with security know-hows; locking down individual devices with tailored endpoint security; and protecting massive databases with large-scale solutions. That way, Bitcoin’s growth won’t create unintended consequences, and the cryptocurrency market will be more secure and stable.

To learn more about this Bitcoin data breach and others like it, be sure to follow us at @McAfee and @McAfee_Business.

The post Cybercriminals Capitalize on Bitcoin’s Boom, Attack Mining Marketplace NiceHash appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/cybercriminals-capitalize-bitcoins-boom-attack-mining-marketplace-nicehash/feed/ 0
What Leakbase Going Dark Means for the Data Breach Lifecycle https://securingtomorrow.mcafee.com/business/leakbase-going-dark-means-data-breach-lifecycle/ https://securingtomorrow.mcafee.com/business/leakbase-going-dark-means-data-breach-lifecycle/#respond Thu, 07 Dec 2017 23:38:46 +0000 https://securingtomorrow.mcafee.com/?p=83050 “Big Company Hit with Data Breach, Millions of Users Impacted.” An all too familiar news title, for an all too familiar issue. It almost seems that each week we read about a new data breach in the news. We learn how it happened, what the hackers went after, and the ramifications. Those affected scan their […]

The post What Leakbase Going Dark Means for the Data Breach Lifecycle appeared first on McAfee Blogs.

]]>
“Big Company Hit with Data Breach, Millions of Users Impacted.” An all too familiar news title, for an all too familiar issue. It almost seems that each week we read about a new data breach in the news. We learn how it happened, what the hackers went after, and the ramifications. Those affected scan their credit, potentially chopping up compromised cards. But what happens after that?

A data breach is just that – data that has been breached. After they’ve attacked an organization, hackers have barrels of stolen information just sitting in their laptops. So, the next question for black hats is often – what do we do with this stolen data? Answer: turn it into profit.

That’s where sites like Leakbase come into play. These crooks can hand over this stolen data to Leakbase, which is a website that has indexed and sold access to billions of usernames and passwords swiped in some of the world’s largest data breaches. Leakbase began its operations in late 2016, advertising access to crucial data stolen from data breaches involving LinkedIn, Myspace, and Dropbox. That is until this week when the site suddenly went dark, discontinuing their service entirely.  In fact, after being discontinued, the domain was redirected to Troy Hunt’s https://haveibeenpwned.com/ site, which actually allows anyone to check to see if specific email addresses have been involved in a data breach. There’s speculation that Dutch law enforcement has been involved in this shutdown, but as of now it remains only that – speculation.

So, even though Leakbase is gone, the existence of the site and others like it serves as an important reminder that the impact of data breaches reverberates louder and longer than we may imagine. “Warehouses of stolen data extend the risk of breaches,” says Christian Beek, lead scientist and principal engineer at McAfee, who helped identify this trend in cybercrime in a 2017 Threats Predictions report.

Beek says the same thing goes for cloud data services, which can be mined for valuable information while also allowing criminals to change and hide their own identities. “The same cloud capabilities that help businesses can also house stolen data and help bad guys constantly cycle through their own information, making them harder to track.” Beek says this brings home the need for evolving security operations centers connected to a community. “If it’s you vs. them, it’s very hard. If it’s all of us vs. them, we have much better odds.”

To learn more about Leakbase and the ramifications of data breaches, be sure to follow us at @McAfee and @McAfee_Labs.

The post What Leakbase Going Dark Means for the Data Breach Lifecycle appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/leakbase-going-dark-means-data-breach-lifecycle/feed/ 0
Cloud Risk in a Rush to Adopt – New Research from the SANS Institute https://securingtomorrow.mcafee.com/business/cloud-risk-rush-adopt-new-research-sans-institute-2/ https://securingtomorrow.mcafee.com/business/cloud-risk-rush-adopt-new-research-sans-institute-2/#respond Fri, 01 Dec 2017 20:00:06 +0000 https://securingtomorrow.mcafee.com/?p=82731 This post was written by Eric Boerger. Twenty-one percent of organizations don’t know if their organization has been breached in the cloud. That uncertainty, lack of control, and limited visibility is a startling indication of the state of cloud use today: The speed of adoption has invited risk that was not foreseen. Understanding that risk is key […]

The post Cloud Risk in a Rush to Adopt – New Research from the SANS Institute appeared first on McAfee Blogs.

]]>
This post was written by Eric Boerger.

Twenty-one percent of organizations don’t know if their organization has been breached in the cloud.

That uncertainty, lack of control, and limited visibility is a startling indication of the state of cloud use today: The speed of adoption has invited risk that was not foreseen. Understanding that risk is key to gaining control over security in the cloud.

Many more industry insights are revealed in Cloud Security: Defense in Detail if Not in Depth: A SANS Survey completed in November and sponsored by McAfee. The survey especially delves into infrastructure-as-a-service from providers like Amazon Web Services (AWS) and Microsoft Azure, which is driving digital business transformation toward the most agile models to date.

Among the findings, some captured in the chart below, include the benchmark that 40% of organizations are storing customer personally identifiable information (PII) in the cloud – and 15% of those had experienced a misconfiguration due to quickly spun up components.

The inevitable goal of cloud adoption is, of course, quite laudable: To realize agility and costs benefits across the organization. The problem is that many IT departments and developers have rushed in, adjusting their delivery models from dedicated hardware in data centers to cloud instances, containers, and now even serverless infrastructure.

Where was security in that fast adoption? Unfortunately, often left behind. Existing endpoint or data center security tools often can’t simply be transferred to the cloud. They need to be rebuilt to run “cloud-native,” designed specifically for the unique properties of public cloud service provider environments. Added to that adjustment is often the dual responsibility of maintaining the public cloud and a virtual private cloud environment in your datacenter – two to manage.

This requires a cloud strategy across these environments: seek policy unification, not tool unification. Cloud security requires change. But there is no point in burdening the agility of the cloud with disconnected management. Your organization should have one view to your infrastructure with one set of policies that everyone understands.

McAfee teamed up with the SANS Institute on an analysis of this survey’s findings. In this presentation, we dive deeper into these points, providing key perspectives on the cloud industry at this crucial time. Tune in here:

Download and read the full report here: Cloud Security: Defense in Detail if Not in Depth: A SANS Survey. For more information on our approach to cloud security, go to  https://mcafee.com/cloudsecurity.

The post Cloud Risk in a Rush to Adopt – New Research from the SANS Institute appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/cloud-risk-rush-adopt-new-research-sans-institute-2/feed/ 0
How IoT is revolutionising the world of sport https://securingtomorrow.mcafee.com/consumer/iot-revolutionising-world-sport/ https://securingtomorrow.mcafee.com/consumer/iot-revolutionising-world-sport/#respond Mon, 27 Nov 2017 10:53:21 +0000 https://securingtomorrow.mcafee.com/?p=82746 This blog post was written by Nick Viney. When we think about the ‘Internet of Things’ (IoT) in sports and fitness, the first things which spring to mind are probably wearable devices, or health monitoring apps that track performance and targets. However, it’s not just activity monitoring hardware that is shaking up the world of […]

The post How IoT is revolutionising the world of sport appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

When we think about the ‘Internet of Things’ (IoT) in sports and fitness, the first things which spring to mind are probably wearable devices, or health monitoring apps that track performance and targets. However, it’s not just activity monitoring hardware that is shaking up the world of sports, we’re also seeing new examples of IoT that are changing the way sports are practised, played and watched.

While the use of IoT on the ‘centre court’ of sports gets most of the attention, the growing use of smart technology behind the scenes is also pretty exciting. I’ve hand-picked a few of my favourite sports to take a look at where and how IoT is being used.

Football

To kick things off, let’s look at arguably the most popular sport in the world – football, fútbol, fussball or soccer, depending on where you’re from. From the Premier League to La Liga, clubs are increasingly using smart footballs during training. These track player performance through sensors located on the inside of the ball, as well as in their boots. The purpose of this is to provide coaches with instant feedback on players’ performance, collecting data on aspects such as spiral efficiency, spin rate, distance and throw velocity. Sensors are also being incorporated into team kits, so club doctors can be alerted to any unusual heart patterns or changes in temperature. But it isn’t just about player performance. Some clubs have introduced IoT-connected lighting on pitches with ‘comfort’ levels to reduce glare for fans, as well as minimise energy costs.

Rugby

As far back as 2010, rugby teams have been using IoT to track their players’ locations through devices worn under their clothing, with League One Club, Bradford Bulls, being one of the first teams to use satellite positioning systems in a game. Nowadays, the Irish and English national Rugby League teams are using STATsports devices to track the wearer’s heart and breathing rates, as well as muscle activity. This means that coaches can spot players that might be feeling the burn and substitute them for a pair of fresh legs, if necessary. More recent advances include sensors being fitted in shoulder pads, also known as force sensors, which captures data from collisions. This data can then be reviewed by coaches and physiotherapists to determine how players should be treated to best limit or recover from injury.

Cricket

Based on the game-changing variables of a cricket match, for example, the length, the weather and how or when the wicket might break up, it’s no wonder the sport was so keen to embrace IoT. Cricket clubs have not only used the technology to improve the monitoring and wellbeing of their players, but also the fan experience. This year in June, the ICC Champions Trophy was the first ever ‘smart cricket’ tournament, which featured virtual reality, drones, connected stadiums and even batting sensors in a bid to bring the sport alive for fans.

Tennis

In the world of sport, tennis is pretty much a veteran when it comes to the use of IoT. Hawk-Eye technology has been used in tennis since 2005 and tracks the path of the ball in flight, allowing players to challenge controversial decisions made by the umpire. In more recent years, technological devices have been placed in tennis players’ racket handles and sewn into wristbands to measure how well a ball was hit, the motion of the racket in hand and the player’s overall performance.

Of course, while more technology in sport can be a great thing, it also comes with risks. There’s no doubt that pushing players harder makes for better and more exciting games, but clubs need to ensure all smart devices and data monitoring systems are sufficiently safe and secure. Strong passwords, protected networks and the latest software are all absolutely critical, especially given the money behind modern sports. As it increasingly becomes the norm to store information on the Cloud and with more data being handled than ever before, sport is becoming a different ‘ball game’ to what it once was. For example, poorly secured IoT devices could be vulnerable to hacking, theft of personal data or even corporate espionage – the stakes are high.

It’s an exciting but important time for the fusion of sport and technology. As time goes on I’m sure we’ll see further developments as IoT becomes more commonplace, in sport, just as we’ve seen in other industries. The balancing act will be ensuring the technology adds to the game, doesn’t detract from the abilities of the players – and of course, doesn’t pose a security issue for clubs, teams and associations.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post How IoT is revolutionising the world of sport appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/iot-revolutionising-world-sport/feed/ 0
What I’m Thankful for This Year: Combining Passion & Career https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/im-thankful-year-combining-passion-career/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/im-thankful-year-combining-passion-career/#respond Wed, 22 Nov 2017 16:00:38 +0000 https://securingtomorrow.mcafee.com/?p=82587

By Philip, Program Manager, People First Office Back in April, I started my new role at McAfee as the Program Manager of our newly-created PeopleFirst Office. It was an exciting yet daunting time as we had launched McAfee as an independent cybersecurity company, just a week  prior to my first day. In the office, the […]

The post What I’m Thankful for This Year: Combining Passion & Career appeared first on McAfee Blogs.

]]>

By Philip, Program Manager, People First Office

Back in April, I started my new role at McAfee as the Program Manager of our newly-created PeopleFirst Office. It was an exciting yet daunting time as we had launched McAfee as an independent cybersecurity company, just a week  prior to my first day. In the office, the excitement was palpable, yet there were the requisite challenges that come with any structural and logistical change of that magnitude. But as I look back, I am thankful for our sound leadership and our collective ability to truly live out our value of Achieving Excellence with Speed and Agility. In just a few short months, we successfully stood up a global multi-billion-dollar company (without losing too much sleep, either!).

As I think about the things that I’m most thankful for, there are three things that are near to my heart:

Family

This week, I am reminded of the journey of those who came before me. Specifically, my paternal grandmother who was the daughter of a first-generation sharecropper from a small town in Arkansas. Ma’dear, as we affectionately called her, was barely able to obtain a secondary education, but she taught our family the value of hard work, discipline and education (or “getting your lesson” as she referred to it). Although she was born during a time when our country still had laws in place that perpetuated racial divides, she instilled in me the value of being proud of my racial and cultural heritage, while also valuing those of others. Thank you, Ma’dear, for setting such a great example that I still follow today.

The PeopleFirst Team

Being guided by such great teachers like Ma’dear, I have always sought out ways to bring people together. I am thankful for my role in the PeopleFirst Office because it is literally the fulfillment of a desire I’ve had my entire life. The mission of our team is simple in statement, but in practice of course, comes with its own set of challenges which I’m excited to rise to every day.. In a nutshell, we work to create an environment that welcomes everyone. That can be hard to achieve within our own small communities, and so for a global company with over 7,000 individual personalities from numerous backgrounds and just as many perspectives, we work hard to make sure we celebrate and encourage all those wonderful things that make us unique.

I’m thankful to work for a company that places tremendous value on each employee and supports the diversity of our global workforce while ensuring that diversity is nourished within an inclusive work environment.

Our HR Team

Every day, I get the opportunity to experience what it’s like to work with an amazing group of people. I love being a part of the Learning and Development team because they find ways to keep the energy positive and upbeat – even if we are trailing the leaderboard for the global McAfee ‘Step To It Challenge’. My team embodies the McAfee spirit in how we collaborate and remain open, receptive to and honest about new ideas that help us live out our values and reach our true potential.

Our entire Plano HR team truly lives the value  ‘We Play to Win or Don’t Play’ . This was on display at our recent Thanksgiving “Dessert and Fun” team activity where we broke out into teams and played Jeopardy and Pictionary with the winning team receiving prizes. Each team also brought in various yummy desserts and treats that surely set us all back a week in our workout routines. Breaking bread with my colleagues not only during the holidays, but after work and even on some weekends tells a lot about our team’s comradery.

It’s opportunities like this which truly make the difference, and I’m so thankful to be a part of such a great community of people.

Happy Thanksgiving to all, and may each of us take a few moments this season to reflect on the things for which we’re thankful!

For more stories like Philip’s follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post What I’m Thankful for This Year: Combining Passion & Career appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/im-thankful-year-combining-passion-career/feed/ 0
The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints? https://securingtomorrow.mcafee.com/business/clock-ticking-can-find-kill-advanced-malware-kills-endpoints/ https://securingtomorrow.mcafee.com/business/clock-ticking-can-find-kill-advanced-malware-kills-endpoints/#respond Thu, 09 Nov 2017 18:25:35 +0000 https://securingtomorrow.mcafee.com/?p=82040 Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security professional. This may put your mind at ease: Through automation, McAfee’s endpoint and sandbox tools can round up the malware, detonate it in a safe place, identify any compromised areas, and prepare them for you […]

The post The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints? appeared first on McAfee Blogs.

]]>
Your company’s computer system has been compromised by disguised malware. There is no greater feeling of dread for a security professional. This may put your mind at ease: Through automation, McAfee’s endpoint and sandbox tools can round up the malware, detonate it in a safe place, identify any compromised areas, and prepare them for you to remediate all threats. With one click.

Today this kind of always-on protection is badly needed.

According to 2016 data from Verizon, 63 percent of organizations faced one or more “advanced attacks” in the past 12 months[1]. These are the attacks that, once they’ve penetrated your front-line defenses, can remain in networks for 200 days[2], on average, quietly collecting information about your organization and waiting for an opportunity to spread. Even when your defenses detect an advanced attack, performing all of the analysis and forensics to understand what it is and where it went takes time—an average of 39 days to contain attacks and 43 days to remediate them, according to the Ponemon Institute[3]. Seeing the disconnect?

It’s not that organizations have no way to detect the signs of an attack—quite the opposite. Too often, they’re struggling with a massively complex security infrastructure, using multiple point solutions that can provide lots of information, but don’t talk to each other. So security analysts get buried in an avalanche of alerts and false positives. They struggle to manually connect the dots between siloed defenses. And while many large enterprises now have sophisticated endpoint detection and response (EDR) tools, they require advanced skills to use effectively—and there just isn’t enough expertise to go round.

Fortunately, there’s a way out of this Catch-22. New McAfee EDR and sandbox tools provide powerful threat analysis and response capabilities that front-line endpoint administrators can use, on their own, without advanced training or expertise. They can help you detect the most evasive malware threats in your environment, and shorten the time between detection and remediation from days or weeks to seconds.

Get to the Bottom of Suspicious or Unwanted Incidents in Seconds

McAfee Active Response EDR tools and McAfee Advanced Threat Defense sandboxing can help you cut through the complexity of siloed defense solutions, without sacrificing the in-depth analysis needed to detect and remediate advanced threats. They can help you:

  • Understand what’s happening more quickly: McAfee Active Response filters through the thousands of alerts coming in from endpoints and other defense systems. It automatically surfaces the most unusual and highest-priority threats, without requiring expert investigators.
  • Quickly uncover advanced threats wherever they are: Through the same interface, administrators can see the full context for any threat, without having to swivel between multiple complex tools and interfaces. Through a single pane of glass, they can view aggregated threat details based on analysis from both internal and external sources, including behavior scores, reputation scores, and other parameters. And they can drill down through a historical timeline that traces when the threat came in, what it did, and where it went.
  • Unmask the most cleverly camouflaged attacks: The most advanced cyberthreats disguise themselves to look like normal application traffic—making it even harder for security teams to understand where and how they’re under attack. McAfee Advanced Threat Defense uncovers the most advanced malware by detonating suspicious files in a safe environment and performing fine-grained analysis on the entire code base. It generates in-depth indicator of attack (IoA) information that your security teams can then use to hunt for similar attacks across your organization.

Shut Down Advanced Cyberthreats with a Click

With much more detailed information—already prioritized and collected in one place—your security teams can identify and control suspicious objects much more quickly. They can then use integrated, automated McAfee EDR tools to take instant action—typically moving from detecting a threat to remediating it on the same screen, with a single click of a mouse.

Security teams can:

  • Remediate threats with one click: When administrators identify an infection, they can see every other endpoint it’s infected at a glance. With one mouse click, they can then remediate the malware threat on an isolated host or across the entire organization.
  • Set triggers and reactions against future attacks: McAfee Active Response provides powerful tools to quickly hunt for IoAs. Administrators can set triggers to search for similar IoAs in the future—in a single action, from the same interface.
  • Inoculate the broader environment: Both McAfee Active Response and McAfee Advanced Threat Defense sandboxing integrate with other McAfee endpoint defenses (McAfee Threat Intelligence Exchange, McAfee Data Exchange Layer (DXL), McAfee Endpoint Security) to create a single, adaptive security fabric. When a new malware threat is uncovered, they update the file’s reputation and immediately inform every other McAfee endpoint agent and security system in the environment to block that threat in the future.

Detect and Stop Malware More Quickly with Integrated Defenses

With conventional endpoint platforms, most of these activities—correlating and prioritizing a suspected threat, discovering all endpoints it’s infected, removing it, tuning other security solutions (IPS, firewall, web gateways, endpoint agents) to detect it in the future—are handled by separate, slioed tools. They require specialized experts and a huge amount of time and effort. That’s why McAfee integrates many of these capabilities with standard endpoint operations.

With McAfee EDR and sandboxing tools, even front-line administrators can view comprehensive information about the security posture of the organization. At a glance, they can see the sources of threat events, the methods used to detect them, the systems affected, attack duration, targets, and actions taken to mitigate them. With instant, actionable threat forensics, along with real-time endpoint data, they can quickly understand the full context of a threat and where deeper scrutiny or action is warranted. They can remediate even advanced attacks throughout the environment with one click, and activate continuous monitoring of the IT infrastructure for every newly unmasked zero-day attack. And they can continually move from detection, to correction, to proactive global protection, in seconds, with a lot less manual time and effort.

Learn More

McAfee can help you detect and respond to advanced threats more quickly, with less time and effort. Learn more about our Dynamic Endpoint Threat Defense solution.

 

[1] Verizon, 2016 Data Breach Investigation Report. http://www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf.

[2] Verizon, 2016 Data Breach Investigation Report. http://www.verizonenterprise.com/resources/reports/rp_DBIR_2016_Report_en_xg.pdf.

[3] Ponemon Institute, The State of Malware Detection and Prevention, March 2016. http://www.ponemon.org/blog/the-state-of-malware-detection-prevention

The post The Clock Is Ticking: Can You Find and Kill Advanced Malware Before it Kills Your Endpoints? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/clock-ticking-can-find-kill-advanced-malware-kills-endpoints/feed/ 0
McAfee Warriors – Building a Community Inclusive of Military Veterans https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-warriors-building-community-inclusive-military-veterans/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-warriors-building-community-inclusive-military-veterans/#respond Thu, 09 Nov 2017 16:16:41 +0000 https://securingtomorrow.mcafee.com/?p=82075

By Dawson McPherson, Talent & Communications Coordinator As we make our way into the month of November, it’s easy to get caught up in a whirlwind of holiday festivities, shopping and delicious food. We love all these things here at McAfee (especially the food part!), and as a global company that recognizes the traditions and […]

The post McAfee Warriors – Building a Community Inclusive of Military Veterans appeared first on McAfee Blogs.

]]>

By Dawson McPherson, Talent & Communications Coordinator

As we make our way into the month of November, it’s easy to get caught up in a whirlwind of holiday festivities, shopping and delicious food. We love all these things here at McAfee (especially the food part!), and as a global company that recognizes the traditions and diverse backgrounds of thousands of employees around the world, we celebrate big and we celebrate often.

Throughout the month of November, McAfee is especially proud to celebrate our military veterans and raise awareness around the value and experience they bring to the workplace.

Veterans like Trevor, a member of our License Compliance Services team based in Plano, Texas, make up a core group of employees who are applying their military skills and experiences to their careers at McAfee.

Prior to joining McAfee, Trevor served in the United States Army for eight years. In addition to his day-to-day role, Trevor serves as the President of McAfee’s Military Veterans Community – a community of veterans and family members dedicated to helping fellow veterans transition from military life into a career at McAfee.

As we look to honor our service men and women around the world this November, hear Trevor’s perspective on what it means to be a military veteran, and what McAfee is doing to build an environment inclusive of military veterans.

Why did you join the military?
Growing up, I always admired soldiers and aspired to be like them. A lot of my family served in the military, and I felt it was my duty to serve as well. Personally, I believe every young person should serve in the military and experience the honor and commitment it provides. It helped me truly understand the freedoms we have in this great country.

In what branch of the military did you serve?
I served in the United States Army for 8 years with a primary position in Transportation and Logistics, as well as a secondary position as a Lead Convoy Security Turret Gunner.

What was the most challenging and rewarding part of serving in the military?
No matter how tough you are, leaving family and friends behind, and not having the ability to talk to them, is difficult. When you’re away from home for extended periods of time, you’re forced to practice patience in a big way. The military is famous for their “hurry up and wait” mentality, which is especially challenging when you’re thinking about family, friends and loved ones back home. 

As challenging as serving in the military was, it was incredibly rewarding seeing soldiers that I’ve trained grow both professionally and personally. I walked away with many lifelong friends with whom I have a bond that can never be broken.

How has your military experience shaped your career at McAfee?
The military has taught me to be an out-of-the-box thinker when adapting to or overcoming challenges. People tend to view military veterans as very straight-laced thinkers. But what many don’t realize is that we’re also innovative thinkers. I learned this first hand when I was given the responsibility to train over 200 soldiers for combat deployment on military vehicles and security tactics. As challenging as it was, I quickly learned to use creative thinking to develop and execute plans – a skill I continue to carry this day.

The military has also given me the drive to succeed in everything I do. Getting up, coming to work every day, and giving 100% effort to everything I do are disciplines that will always been engrained in me. When you serve in the military, you are completely devoted to the mission at hand, and the fact that I was a part of something bigger than myself really fueled my motivation. That’s one of the many reasons why McAfee is a great place for veterans. As employees, we are asked to sign “The McAfee Pledge” wall. Part of our pledge is to not rest in our quest to protect the safety of our families, our communities, and our nations. There’s something about signing your name to a pledge that makes you feel like you’re part of something bigger.

What is the McAfee Military Veterans Community, and how did you get involved?
The McAfee Military Veterans Community is an employee-led community devoted to creating a diverse and inclusive environment where veterans can bring their full, authentic selves to work. I was asked if I was interested in heading up one of the veteran’s events here at McAfee Plano almost 2 years ago. I jumped right in and have helped grow the Military Veterans Community ever since.

As the President of the McAfee Military Veterans Community, what do you hope to accomplish through the group?
There is a certain stigma that all veterans suffer from post-traumatic stress disorder (PTSD) and other forms of mental illness. There is already a big enough stigma against mental illness, but then add in the combat training/experience aspect and people are afraid you’re going to snap if someone doesn’t refill the coffee pot. There’s still a lot of education to be done, which in turn would encourage more veterans to identify themselves in the workplace.

As President of the Military Veterans Community, I want to help break that stigma and raise awareness around the qualities, skills and value veterans bring to the workplace. Part of our wider strategy as a community is to:

  • Help McAfee become a Top Military Employer of Choice
  • Expand our recruiting of military veterans
  • Provide networking opportunities for veterans and other McAfee employees
  • Helping veterans transition into careers at McAfee
  • Continue highlighting how much of an asset employing veterans can be

What advice do you have to those transitioning out of the military into a civilian career?
Many veterans face a difficult transition into civilian life – ranging from readjustment issues to recovery from physical and mental injuries. I’ve heard veterans say they have difficulty adjusting to the civilian culture and relating to civilians. A lot of it comes down to the camaraderie they experienced in the military. It’s important to know that finding a company where you find that sense of belonging and purpose, is possible and can be just as rewarding.

Transitioning out of the military requires veterans to learn new skills, adjust to a new pace and adapt to social changes. The military provides structure and has a clear chain of command, which does not naturally exist outside the military. Therefore, veterans after are often left to create their own structure or adjust to living in an environment with more ambiguity. This is why networks, such as our own Veterans Community at McAfee, can play a valuable role in helping veterans to find their feet and adapt quickly.

In the military, personnel do not leave until the mission is complete. In a private sector business, an employee might be expected to stop and go home at 5 p.m. – whether the “mission” is complete or not. This may not be apparent to all veterans.

Civilian workplaces may be competitive environments, as opposed to the collaborative camaraderie of the military. Given the direct and sometimes blunt nature of communication in military settings, there may be subtle nuances in conversations and workplace lingo that are unfamiliar to veterans.

My best advice for veterans is to adapt, overcome, and prepare. Corporate life is different from the military in many ways, but the military has taught us to be resourceful, disciplined and agile and we often have strengths, skills and capabilities that are highly sought after and not as easily gained outside of the military. Prepare your resume by highlighting how your military skills translate into a corporate role.  And never be afraid to ask for help.

In what ways is McAfee inclusive of the Veteran’s community?
Once I left the military, I felt a sense of loss, as I did not have a purpose or mission to accomplish. McAfee provides veterans with a mission and pledge they can follow. Values are a key component in the military, and the fact that McAfee lives its own values says a lot about the company.

What is the most meaningful way to recognize a veteran?
A simple ‘thank you’ is the most meaningful way to recognize a veteran. We don’t ask for much, but a small thanks can go a long way to make us feel appreciated.


Thank you, Trevor, for your sacrifice and ongoing commitment to making the world a safer place. And thank you to the brave men and women around the world who have served to protect our freedom.

Interested in learning more about McAfee careers for military service members and veterans? Join our talent network here.

The post McAfee Warriors – Building a Community Inclusive of Military Veterans appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-warriors-building-community-inclusive-military-veterans/feed/ 0
Celebrating Halloween – McAfee Style https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-halloween-mcafee-style/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-halloween-mcafee-style/#respond Tue, 31 Oct 2017 16:09:09 +0000 https://securingtomorrow.mcafee.com/?p=81831

By Dawson McPherson, Talent & Communications Coordinator Two weeks ago, I stepped into the McAfee Plano office with a mixture of emotions – excited, eager, nervous. It was my first day as a McAfee employee, and like most people starting a new job, I didn’t fully know what to expect. So, I took a deep […]

The post Celebrating Halloween – McAfee Style appeared first on McAfee Blogs.

]]>

By Dawson McPherson, Talent & Communications Coordinator

Two weeks ago, I stepped into the McAfee Plano office with a mixture of emotions – excited, eager, nervous. It was my first day as a McAfee employee, and like most people starting a new job, I didn’t fully know what to expect. So, I took a deep breath and started my journey at McAfee fully embracing the unknown.

In just a few short weeks, that ‘unknown’ has quickly turned into a sense of belonging and purpose.

While it’s easy for companies to boast about their fun-loving cultures and family-like values, I’m already amazed at the lengths McAfee goes to make work a great place to be for their over 7,000 employees worldwide. Because we’re encouraged to work hard, be ourselves, and have fun at work, many of the stereotypes and ‘silos’ that exist in the typical corporate work environment are few and far between at McAfee.

Take Halloween, for example. It happens to be a big deal around here. Last week, the company held a “trick-or-treat” event and office decorating competition for employees and their families. The halls were filled with kiddos in costumes, lots of laughter (and a little bit of screaming), ghoulish decorations, and a plethora of candy (that reminds me, I need to get started on that sugar detox!). What stood out to me most, however, was just how creative, innovative, and ‘all out’ each department went to win the decorating contest.

I must admit that this year’s contest winner came as a surprise to me. The Tax team, part of our wider Finance department and commonly known as a serious-natured group, swept the competition with their fun and crazy Frankenstein theme. Fueled by one of our favorite McAfee core values, “We play to win or don’t play,” the Finance folks pulled out all the stops to secure their victory.

When asked what made the Halloween event so special, Anne, a Finance Manager based in our Plano office said, “McAfee empowers us to be excellent in everything we do. Whether it be the launch of a new product, or hosting a fun Halloween party for our employees, we make it the best it can be. Every time.”

But it’s not just about our winning attitude, it’s also about our inclusive culture and acknowledging the role that families play to help make our teams successful. “McAfee is great about recognizing the importance of our families and letting them be a part of our office on occasion,” concluded Anne.

Here are a few pictures of the winning decorations.

Finance wasn’t the only department to get in the Halloween spirit. Employees from across the organization celebrated in true McAfee fashion. Just take a look at some of the spook-tacular pics below.

Of course, we couldn’t miss the opportunity to dress up our pups. Last Friday, employees were encouraged to bring their pups to the office in full costume. We had some strong contenders, but here a few of our “best dressed” winners.

As we make our way into the holiday season, I’m especially thankful to be a part of a company that openly encourages and promotes diversity, innovation, and fun in the workplace. What are some of the ways you celebrate and observe global holidays at your workplace? Share your stories in the comments below!

Follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about.

The post Celebrating Halloween – McAfee Style appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/celebrating-halloween-mcafee-style/feed/ 0
Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/inclusion-drives-innovation-employees-perspective-differently-abled/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/inclusion-drives-innovation-employees-perspective-differently-abled/#respond Fri, 27 Oct 2017 20:00:08 +0000 https://securingtomorrow.mcafee.com/?p=81755

By Karla Jackson, Digital Media Specialist, McAfee “With Our People at The Heart, We Are McAfee.” If you make your way around the halls of McAfee, you’ll see this short but powerful declaration plastered on our walls, cubicles, and computer desktops. It unifies our core values and shines a light on the most important and […]

The post Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled appeared first on McAfee Blogs.

]]>

By Karla Jackson, Digital Media Specialist, McAfee

With Our People at The Heart, We Are McAfee.”

If you make your way around the halls of McAfee, you’ll see this short but powerful declaration plastered on our walls, cubicles, and computer desktops. It unifies our core values and shines a light on the most important and celebrated part of McAfee: Our People. And if we had to choose a favorite month to recognize our talented and diverse group of employees, it would have to be October.

This year during the month of October, McAfee recognizes National Disability Employment Awareness month (NDEAM), an awareness campaign that celebrates the contributions of differently abled workers and the value of workforce inclusion.

This year’s NDEAM theme, “Inclusion Drives Innovation,” is especially near to our hearts because it aligns with one of McAfee’s five core values: “We innovate without fear.” And you’ll be hard-pressed to find a better group of people who embody this at McAfee than our differently abled community.

We recently spoke with one of many McAfee employees—Sriranga—who is fearlessly making a positive impact in his job and surrounding community.

Tell us a little bit about yourself.

My name is Sriranga, and I have been with McAfee for almost a year as a technical support engineer in Bangalore. I have a bachelor’s degree in mechanical engineering and have been in the IT industry for seven years. I am a positive guy, and a fun-loving person who loves to hang out with friends on the weekends.

Can you share more about your impairment?

It all started as back pain for a couple of days. On December 23, 2013, I started feeling giddy, and needed to seek medical attention. On the way to the hospital with my mom and uncle, I suddenly felt a loss of sensation from waist down, I had no clue what was happening.

Once I arrived to the hospital, I had several tests run and ended up having surgery to remove a hematoma by my spine. The operation was a success, but the clot had damaged my spinal nerves. Though I regained the sensation in my legs, the muscular power in my legs was poor. I was diagnosed with paraplegia (impairment in motor or sensory function of the lower extremities, typically caused by spinal cord injury). Since then, I roll on wheels everywhere.

How has being differently abled impacted your career?

There haven’t been many challenges, but here are a few:

  • I am not well equipped to fill roles that require a lot of travel.
  • Before working at McAfee, I had trouble finding workplaces that were accommodating of my impairment.
  • Getting professional certifications has been a challenge because most places are not wheelchair friendly in Bangalore.
What would you like to share about being differently abled at McAfee?

McAfee from day one has always been very positive towards me – from the interview process to supporting my commute from home to the office. McAfee has also made every possible attempt to build and provide the facilities that are accessible for wheelchairs, which is most important because outside of work, wheelchair accessibility is a major challenge here in Bangalore.

What would you like people to know about the differently abled community?

As a differently abled person, I would like people to know that we are a community like everyone else, and can perform in our roles like eve

ryone else, even if it may be slightly different in nature. Creating an inclusive approach, empowering the abilities of every person, and acknowledging that everyone matters is important. I take pride in being differently abled and doing things differently!

In what ways have you seen the support and resources provided to differently abled people improve, and where are there still opportunities for growth?

Providing employment opportunities to people who are differently abled has improved. Also, the number of companies conducting campaigns and creating awareness and support has been immense. I believe that individuals and companies are demonstrating more faith and belief in the different functions to which the differently abled can contribute.

Opportunities persist in creating better access to places inside and outside of buildings and to creating more career opportunities in different parts of organizations. Even with the positive steps forward, there’s still a need for more awareness and empowerment programs.

With McAfee being an inclusive employer, I can innovate and do my job without fear. I am looked at as an individual without any stigmas related to my impairment, and with this I can continue to always be a positive peer at work. Kudos to McAfee for demonstrating faith and belief in the different functions to which the differently abled can contribute.

To see more of our company culture, follow @LifeatMcAfee on Instagram and for more stories like Sriranga’s follow us on Twitter at @McAfee.

Interested in joining our teams? We’re hiring! Apply now.

 

The post Inclusion Drives Innovation: An Employee’s Perspective on Being Differently Abled appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/inclusion-drives-innovation-employees-perspective-differently-abled/feed/ 0
The McAfee Adventures of a Middle School Teacher https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-adventures-middle-school-teacher/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-adventures-middle-school-teacher/#respond Mon, 09 Oct 2017 00:00:41 +0000 https://securingtomorrow.mcafee.com/?p=79724

By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. – A.A. Milne My own adventure from the classroom and into corporate America began with an email from my school district – Plano ISD. To enrich the classroom-to-career connection, PISD partnered up with the Mayor’s Summer […]

The post The McAfee Adventures of a Middle School Teacher appeared first on McAfee Blogs.

]]>

By Lori, AVID Teacher, Haggard Middle School

I knew when I met you an adventure was going to happen. – A.A. Milne

My own adventure from the classroom and into corporate America began with an email from my school district – Plano ISD. To enrich the classroom-to-career connection, PISD partnered up with the Mayor’s Summer Internship Program to pilot the Teacher Externship Program. It was a no-brainer. I jumped on the opportunity to work alongside industry professionals to make sure my middle school teachings aligned with the demands of the workplace.

McAfee, a corporate partner of the program, generously hosted me for two weeks. Determined to absorb all I could, I shadowed someone different within the Human Resources department each day during an especially exciting time. McAfee was in the midst of transitioning to an independent company, so Human Resources was hard at work getting new processes and procedures in place and standing up their new company culture and values.

 

 

 

As I listened in to the teams and individuals, the importance and relevance of McAfee’s values struck me. McAfee’s values include:

  • We innovate without fear.
  • We play to win or we don’t play.
  • We achieve excellence with speed and agility.
  • We practice inclusive candor and transparency.
  • We put the customer at the core.

Let me share how these corporate values translate into my daily teachings.

We innovate without fear.

McAfee Meaning: Don’t hesitant to try something new. Experiment to find a better way of achieving results. Embrace your failures and learn from them.

Teacher Takeaway: Thinking outside the box is something educators constantly encourage. We also try to be mindful about our approach to failure. It is not something to be feared, but instead treated as a learning opportunity.

We play to win or we don’t play.

McAfee Meaning: Give it your all. Go in confidently. Fully invest in your work.

Teacher Takeaway: Initially, you might do a double take about this value, but when you consider McAfee’s meaning, it is something teachers bring into the classroom and encourage among our staff. It boils down to going all in and giving it your best, no matter what. As an educator, I am trying to prepare responsible citizens who have a passion and give it their best.

We achieve excellence with speed and agility.

McAfee Meaning: Commit to quality. Be nimble. Adjust as needed.

Teacher Takeaway: This one hit home for me. We want our students to grow and develop under our instruction as problem-solvers. Students should know how to construct meaning, address problems and make decisions deploying different thinking strategies. We want to shape critical thinkers who address problems effectively and can switch course as needed.

We practice inclusive candor and transparency.

McAfee Meaning: Celebrate differences. Communicate clearly with respect.

Teacher Takeaway: The importance of helping students communicate effectively quickly became evident. The workplace values employees who express themselves concisely and actively listen. We also need to teach our students to do this with integrity and fidelity.

We put the customer at the core.

McAfee Meaning: Every customer is important. Proactively meet the customer’s needs and anticipate needs before they even arise.

Teacher Takeaway: As educators, we place our students at the center of everything we do. Our decisions are predicated on, what is best for our students? They rest at the center of vision and mission statements. This means going beyond just preparing them for the test next week or at the end of the year, but for the future they envision.

My time at McAfee encouraged me to examine the systems and structures within my own classroom through a different lens. I’m reminded students need knowledge, but also need skills like creativity, analytical thinking, interpersonal communications and adaptability in their arsenal. Witnessing the creation of McAfee’s core values rejuvenated my dedication to setting and clearly articulating goals, norms and values in my classroom for my students, peers, and school.

A big thank you to the McAfee team for allowing me to join you for two weeks. My adventure in the corporate world better equipped me to prepare my students for career success. And who knows? Maybe their own adventures will take them to McAfee!

For more stories like Lori’s, follow @McAfee on Twitter.

The post The McAfee Adventures of a Middle School Teacher appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/mcafee-adventures-middle-school-teacher/feed/ 0
Smart Parents Dig Deeper Than Clickbait https://securingtomorrow.mcafee.com/consumer/smart-parents-dig-deeper-clickbait/ https://securingtomorrow.mcafee.com/consumer/smart-parents-dig-deeper-clickbait/#respond Sun, 08 Oct 2017 23:00:42 +0000 https://securingtomorrow.mcafee.com/?p=79647 This blog was written by Jocelyn Brewer. We’ve all seen it – that family at the café, heads down, scrolling on screens. Tsk tsk! We judge instantly and bemoan a loss of connection with nostalgic memories of how we used to play cricket in the street and talk to each other instead. Cue the sensational […]

The post Smart Parents Dig Deeper Than Clickbait appeared first on McAfee Blogs.

]]>
This blog was written by Jocelyn Brewer.

We’ve all seen it – that family at the café, heads down, scrolling on screens. Tsk tsk! We judge instantly and bemoan a loss of connection with nostalgic memories of how we used to play cricket in the street and talk to each other instead.

Cue the sensational headlines warning of the dangers of screens being linked to everything from speech delays to autism and stripping humans of empathy, replacing it with narcissism – these play into our niggling fears and are rich sharable fodder for social media where we can absolve our parenting doubts with digital thumbs-up.

Regularly our tech use is compared to drugs and addiction, a harsh and overplayed analogy that further entrenches melodrama while failing to propose the practical skills to empower positive digital citizenry. Preparing young people for a technologically enhanced future requires older generations to become meaningfully engaged in the complex issues of what it means to be a human in an online world – one in which most  children have a ‘digital tattoo’ before they’re born and on average 1000 images shared on social media by their 5th birthday.

Modern parents are just as likely to be glued to their screens as their teenage offspring. While they’re checking work emails from the footy sideline in an effort to keep the epidemic of busyness at bay, they’re playing a powerful role in their child’s social learning. Like playing dress-ups in high-heels, children mimic adults’ tech-use – watching eagle-eyed at the brightly lit screen and competing with the device for attention.

Not ‘getting’ technology is no longer an excuse that these ‘digital immigrants’ can hide behind while young people are left, quite literally, to their own devices. Where high-powered computing gadgets are regularly gifted for birthdays and festive seasons, and ‘keeping up with the iPhoneses’ is a by-product of digital obsolescence – we need to also give the gift of digital literacy and digital intelligence (DQ) by knowing how to model it ourselves.

Being ‘smart’ online is not simply about protecting kids from being groomed by predators, stopping them from sexting or saving their grandparents from online email scams. More-and-more it’s about our overall digital health and wellbeing and our ability to find that elusive balance between using technology to flourish and getting trapped in a downward scrolling spiral.

This week is Stay Smart Online Week. It’s an opportunity to move beyond the simplistic narratives of ‘switch it off’ and counting digital calories through ‘virtually impossible’ screen time limits, and engage in the tougher, deeper conversations around the quality of the online content, the context in which its consumed, and the cognitions that accompany it. While computers will certainly become more and more invaluable to parents, there’s no app “solution” (yet) for present, patient parenting.

Banning technology or promoting ‘detoxing’ from it doesn’t equip us with the skills to moderate usage. Instead it becomes a salacious item to cunningly access or to binge/purge from. Conversely using screens to bribe or pacify young people as they learn to regulate their emotions can teach dysregulated responses and demand behaviours.

In some instances, we can use software to mitigate security risks, track our scrolling habits and help regain control of our time online, but increasingly it’s the development of ‘soft skills’ – traits linked to emotional intelligence – that are key to mastering a savvy and sustainable relationship to technology.

What’s missing are the skills to stop and smell the science – to think critically about the headlines (many of which we can’t resist sharing out on social media, sometimes without even reading), the quality of the research we’re shown and the discourse that goes with it.  Both media and digital literacy are skills, quite different to the traditional technical ones, that cannot be taught effectively by ad-hoc school incursions or annual guest speaker slots. Parents and schools must be partners in providing young people with ongoing and authentic opportunities to safely explore the digital frontier and to understand the emerging cyber-psychological issues which add a new layer of complexity to an already challenging developmental period of their lives.

So, next time you see that family in the café – maybe wonder if they haven’t already been on a long bike ride together and dig deeper into what they’re really doing, reading an open source journal, improving their phonics with a research-backed app, chatting to a cousin in Hanoi or booking into their next gym class.  It’s not all sexting, selfies and Candy Crush.

Key points:

  • Beware of sensational headlines about the zombie apocalypse: the kids are alright.
  • Being smart online is also about protecting our digital health and wellbeing, creating healthy digital habits (including how we think and behave online).
  • Screen ‘time’ is a simplistic metric and we need to ask deeper questions about the quality of the content, context and function of the activity.
  • Parents benefit from checking/correcting their own online habits and consider their role as media-mentors, and co-consumers/participants alongside their kids.
  • Digital abstinence or detoxes, bans or a reliance on monitoring software don’t teach the social-emotional skills required to use technology in a balanced meaningful way.
  • Developing digital literacy and digital intelligence (#DQ) are crucial skills for being a savvy digital citizen.

The post Smart Parents Dig Deeper Than Clickbait appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/smart-parents-dig-deeper-clickbait/feed/ 0
Stefan’s Tale: A 17-Year Journey to McAfee https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/stefans-tale-17-year-journey-mcafee/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/stefans-tale-17-year-journey-mcafee/#respond Tue, 03 Oct 2017 14:00:48 +0000 https://securingtomorrow.mcafee.com/?p=79594

By Stefan, Senior Security Consultant in Sydney, Australia. When I was younger, I wanted to be a policeman and help stop bad guys. As I got older, my dream career evolved into wearing a different kind of shield to stop a different type of bad guy. And in a 17-year tale spanning continents, I finally […]

The post Stefan’s Tale: A 17-Year Journey to McAfee appeared first on McAfee Blogs.

]]>

By Stefan, Senior Security Consultant in Sydney, Australia.

When I was younger, I wanted to be a policeman and help stop bad guys. As I got older, my dream career evolved into wearing a different kind of shield to stop a different type of bad guy. And in a 17-year tale spanning continents, I finally landed at the company I wanted to work for – McAfee.

I now sport the McAfee shield as a senior security consultant working with customers across Asia Pacific to keep them safe from cyberthreats. How did I know McAfee was where I wanted to be and why did it take me 17 years to get here? Let’s go back to the beginning.

The Beginning.

I loved working with McAfee’s products from the start. As an endpoint security specialist for a managed service provider, I got my first taste of McAfee with one of its now world-famous antivirus products. The product impressed me, but what impressed me most was how the company operated.

I noticed how the UK support team I worked with listened. It was a two-way street of communication that resulted in product updates. With customer input, I watched it evolve into the awesome Endpoint Security product we have today.

I knew then I wanted to work for McAfee. I became skilled with ePolicy Orchestrator (ePO), the most advanced security management software in the industry, and found myself very passionate about it. I eventually became the go to person for both Endpoint and ePO across my entire company and carried the tag ‘McAfee guy’ for years.

I never doubted my passion and skills would one day lead me to McAfee. I just needed an opening.

The Middle.

As luck would have it, around the same time my family and I decided to embark on a life-changing adventure and emigrate to Australia, the McAfee’s UK team approached me with a position. The timing wasn’t right and I reluctantly turned it down. But I never lost sight of my goal.

After a few years in Australia, the plot thickened and I got involved with the creation of a new managed security services SOC using McAfee’s SIEM solution. I immediately felt at home with the product. Like my first encounter with McAfee, the product was easy to setup and easy to use. But more importantly, it introduced me to some of the amazing McAfee employees within Australia and North America.

While building rapport with those employees, my desire to work for McAfee grew stronger. I noticed how they supported and encouraged each other, as a team. And my conversations with them reinforced that McAfee wasn’t a company that feared innovation. All over again, I realized everything McAfee could offer me and my career.

Eventually, I saw another opening to be part of something amazing. The perfect position was available. After a long chat over a beer and some encouragement from an awesome friend and (future) colleague from North America, I pursued a role with McAfee’s Professional Services.

The End.

After 12 months and a move to the other side of Australia, I can say with my hand on my heart, the wait was worth it. I have never loved a job as much as I love what I do for McAfee. Every day I wake up excited for the day ahead in Professional Services. Primarily, I work on our SIEM product to detect threats and then help organizations prioritize, investigate and rapidly resolve any cyberthreats.

So, I am now the one listening to each customer. How we implement our product depends on the nature of the customer’s business, which means each day brings something different. I must think quickly and adjust my way of thinking. One day I may be completing a SIEM assessment at a bank, another helping customers set up a new MSSP SOC for a retail business or the next running a training course teaching our products and methodologies to the next budding generation of security analysts. And the best part? When a customer asks for me to return. That’s when I know I achieved my goal of making the customer 100 percent happy.

I am living my childhood dream of keeping the bad guys at bay while working with an amazing team in both Australia and worldwide. In fact, I’ve reconnected with the colleagues I met 17 years ago in EMEA, who are still with McAfee. How’s that for a testimony!

For those still at the beginning or maybe in the middle of their own story, I encourage you to be patient, follow your heart and when you have the opportunity, grab it and go for it. And for me, this isn’t really the end of my tale. It’s the beginning of my next 17 years where I’m supported by an amazing team at an amazing company, McAfee.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter @McAfee to see what working at McAfee is all about. Interested in joining our teams? We’re hiring! Apply now!

The post Stefan’s Tale: A 17-Year Journey to McAfee appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/stefans-tale-17-year-journey-mcafee/feed/ 0
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/first-30-days-mcafee-pups-work-vr-pledge-wall/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/first-30-days-mcafee-pups-work-vr-pledge-wall/#respond Wed, 27 Sep 2017 18:00:52 +0000 https://securingtomorrow.mcafee.com/?p=79259

By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized McAfee as one of the Top 100 Places to Work. But still, day one didn’t come without its nerves. I was joining the largest dedicated security company and making my biggest career move yet. Now […]

The post First 30 Days at McAfee: Pups at Work, VR and Pledge Wall appeared first on McAfee Blogs.

]]>

By Beth, HR Communication Specialist in Plano, Texas.

For the last six consecutive years, The Dallas Morning News has recognized McAfee as one of the Top 100 Places to Work. But still, day one didn’t come without its nerves. I was joining the largest dedicated security company and making my biggest career move yet.

Now one month later, I can say McAfee’s accolades are well deserved. If the dog-friendly Friday policy wasn’t enough to convince me, I’m surrounded by talented people, doing meaningful work. Here are three things that stand out about McAfee after my first 30 days.

One Big Team.

Together is power. Cybersecurity is a team sport. Let’s work together. If you can’t tell, McAfee’s brand is built on the belief there is power in working together to stop cyberthreats. And in the interview process, I heard, “We are one big team.” You never know the truth until you’re immersed in the company, so it’s reassuring to find this holds water.

In recent months, McAfee emerged as an independent company. As part of the Human Resources Communication team, I’m working with our global HR team to roll out new processes, procedures, culture initiatives and more. I’m constantly impressed with the level of collaboration and willingness to adjust course as needed. I already feel part of the McAfee team.

Think Big.

As a cybersecurity company, innovation is necessary to stay ahead of the curve, ahead of the threats. But thinking creatively isn’t just limited to the engineers. Leadership encourages it in all facets of the organization, including on my HR Communication team.

During my first week, my team was tasked with creating a recruitment video. Video is a staple for all communicators. But in an environment encouraging innovative thinking, we went a step further by producing a 360° video! I hit the ground running and in just 30 days, we went from conception to completion. With the right team and mindset, no idea is too big.

Working for a company that never settles means you won’t face a stagnant career at McAfee. With no experience in 360° video and in my first month no less, I was entrusted with an exciting, cutting-edge project. McAfee is a place to carry out your big ideas, develop new skills and advance your career.

Surprise! Cybersecurity is Important.

In true millennial fashion, I wanted a job with a strong sense of purpose. So, I spent the bulk of my career in the nonprofit realm, working towards alleviating poverty, empowering women, building a better world. I looked forward to my career shakeup, but would I sacrifice meaning moving to McAfee? The answer is a resounding no.

In orientation on day one, the facilitator asked us newbies to envision a world of autonomous vehicles, where my commute transforms into a time for productivity or relaxation (anything but frustration!). What happens if an attacker targeted that technology? The results? Disastrous. And fear of catastrophe could stop innovation in its tracks.

For me, this brought a new appreciation of McAfee’s purpose to protect all that matters and drive limitless innovation, securely. But this is no shocking revelation for those already devoted to the cause, evidenced by McAfee’s pledge wall.

This can’t-miss, bright red wall allows employees to voluntarily show their commitment to defending the world against cyberattacks. I admit, I was eager to add my name. When I found hardly any empty space to sign, I knew McAfee was more than just a company with a purpose. It’s a company filled with purpose-driven, passionate people.

Thirty days ago, I walked into McAfee with high expectations and I’m happy to say McAfee exceeded them all. I’m proud to work alongside an inspiring team doing work full of purpose. I look forward to all the experiences and learning McAfee will bring!

For more stories like Beth’s, follow @McAfee on Twitter.

The post First 30 Days at McAfee: Pups at Work, VR and Pledge Wall appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/first-30-days-mcafee-pups-work-vr-pledge-wall/feed/ 0
Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize https://securingtomorrow.mcafee.com/consumer/dangerous-celebrities-2017-rt2win-hollywood-worthy-prize/ https://securingtomorrow.mcafee.com/consumer/dangerous-celebrities-2017-rt2win-hollywood-worthy-prize/#respond Fri, 22 Sep 2017 15:00:09 +0000 https://securingtomorrow.mcafee.com/?p=79007 “Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the release of our 11th annual roundup of the Most Dangerous Celebrities—that is, the stars that are most likely to land you viruses when searched for online. Can you guess who took this year’s number one […]

The post Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize appeared first on McAfee Blogs.

]]>
“Hey hey, you you!” Did you hear that we released our 2017 Most Dangerous Celebrities List? This year marks the release of our 11th annual roundup of the Most Dangerous Celebrities—that is, the stars that are most likely to land you viruses when searched for online.

Can you guess who took this year’s number one spot? Singer-songwriter Avril Lavigne! Our annual study showed that 14.51% of searches for this starlet’s name led everyday users to malicious websites. So much for her “Happy Ending!”

This year’s list also included former boy band member Zayn Malik, tabloid favorite DJ Calvin Harris and the flawless Beyonce Knowles.

Now, we know it must be upsetting to hear that some of your favorite celebrities aren’t so glamorous, so we’re treating you to a #RT2Win sweepstakes on the @McAfee_Home Twitter handle. One lucky winner of the sweepstakes drawing will receive a $250 Amazon gift card.  Don’t worry, we’re not going “to go and make things so complicated.” Follow these simple instructions to enter the sweepstakes. Good luck!

#RiskyCeleb #RT2Win Sweepstakes Official Rules

  • To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win sweepstakes tweet.
  • The sweepstakes tweet will be released on Friday, September 22nd. This tweet will include the hashtags: #RT2Win and #RiskyCeleb.
  • Retweet the sweepstakes tweet released on the above date, from your own handle. The #RT2Win AND #RiskyCeleb hashtags must be included to be entered.
  • We will announce the winner on Friday, September 29, 2017 via Twitter. 

Terms and Conditions

  • How to enter (Official Rules): No purchase necessary. A purchase will not increase your chances of winning. The “McAfee Most Dangerous Celebrity study published by McAfee ” Retweet to Win Drawing (the “Sweepstakes”) will have 1 drawing period, during which all entries must be received. Pacific Time shall control for all purposes of this Sweepstakes. One (1) winner will be chosen. The Entry period is as follows:
  • Entry: 8:00 AM (PST) Friday, September 22nd, through 5:00 PM (PST) Friday, September 29th.

To Enter: During the Entry period, go to the @McAfee_Home Twitter page and go through the following steps:

  • Find the sweepstakes tweet, published on Friday, September 22nd, which will include the hashtags: #RT2Win and #RiskyCeleb.
  • Retweet the sweepstakes tweet and make sure it includes both the #RT2Win and #RiskyCeleb hashtags.
  • Note: Tweets that do not contain both #RiskyCeleb and #RT2Win hashtags will not be considered for entry.
  • Limit one entry per person

An eligible winner will be announced the final Friday of the drawing period (Friday, September 29th) by 5pm PST on the @McAfee_Home feed, featuring the #RT2Win and #RiskyCeleb hashtags. Each retweet must include the #RT2Win and #RiskyCeleb hashtags to be eligible to win. No other method of entry will be accepted besides Twitter. Only one eligible retweet per person. SWEEPSTAKES IS IN NO WAY SPONSORED, ENDORSED, ADMINISTERED BY, OR ASSOCIATED WITH TWITTER, INC.

  • Eligibility: The sweepstakes is open in the US to those who are 18 years of age or older on the date the sweepstakes begins. Employees of McAfee (Sponsor) and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.
  • Winner Selection: The winner of the Drawing will be selected at random from all eligible retweets received during the Drawing’s entry period. By participating, entrants agree to be bound by the Official Sweepstakes Rules and the decisions of the coordinators, which shall be final and binding in all respects. The odds of winning depend on the total number of eligible retweets received.

Winner Notification: The winner will be notified via direct message on Twitter at the end of the entry period. The prize winner will be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within fourteen (14) days of written notification, or prize may be forfeited and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within four (4) calendar days from the first notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

  • Prizes: The prize for the Sweepstakes is one $250 gift card to Amazon.com. Total ARV $250. Entrants agree that McAfee has the sole right to determine the winner of the Sweepstakes and all matters or disputes arising from the Sweepstakes and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of McAfee.

Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the winner’s sole responsibility…

  • General conditions: Entrants agree that by entering they agree to be bound by these Official Sweepstakes Rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the winner.

Sponsor, Twitter, Inc, and any of their respective companies, is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the Drawing, or by any technical or human error, which may occur in the processing of the Drawing entries. By entering, participants release and hold harmless McAfee and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the sweepstakes, any prize won, any misuse or malfunction of any prize awarded, participation in any Sweepstakes-related activity, or participation in the Sweepstakes.

Prize Forfeiture: The prize will be awarded.  If the winner cannot be notified, does not respond to a notification, does not meet eligibility requirements, or otherwise does not comply with these Drawing rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entries for the Drawing.

Limitations of Liability:  By entering the Sweepstakes, you release Sponsor and all Released Parties from any liability whatsoever, and waive any and all causes of action, related to any claims, costs, injuries, losses, or damages of any kind arising out of or in connection with the Sweepstakes or delivery, misdelivery, acceptance, possession, use of or inability to use any prize (including claims, costs, injuries, losses and damages related to rights of publicity or privacy, defamation or portrayal in a false light, whether intentional or unintentional), whether under a theory of contract, tort (including negligence), warranty or other theory.

TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL THE SPONSOR OR THE RELEASED PARTIES BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING LOSS OF USE, LOSS OF PROFITS OR LOSS OF DATA, WHETHER IN AN ACTION IN CONTRACT, TORT (INCLUDING, NEGLIGENCE) OR OTHERWISE, ARISING OUT OF OR IN ANY WAY CONNECTED TO YOUR PARTICIPATION IN THE SWEEPSTAKES OR USE OR INABILITY TO USE ANY EQUIPMENT PROVIDED FOR USE IN THE SWEEPSTAKES OR ANY PRIZE, EVEN IF A RELEASED PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL THE AGGREGATE LIABILITY OF THE RELEASED PARTIES (JOINTLY) ARISING OUT OF OR RELATING TO YOUR PARTICIPATION IN THE SWEEPSTAKES OR USE OF OR INABILITY TO USE ANY EQUIPMENT PROVIDED FOR USE IN THE SWEEPSTAKES OR ANY PRIZE EXCEED $10.  THE LIMITATIONS SET FORTH IN THIS SECTION WILL NOT EXCLUDE OR LIMIT LIABILITY FOR PERSONAL INJURY OR PROPERTY DAMAGE CAUSED BY PRODUCTS RENTED FROM THE SPONSOR, OR FOR THE RELEASED PARTIES’ GROSS NEGLIGENCE, INTENTIONAL MISCONDUCT, OR FOR FRAUD.

 

Dispute Resolution: Entrants agree that McAfee has the sole right to determine the winner of the drawing and all matters or disputes arising from the drawing and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of McAfee.

Governing Law: The Drawing and these rules will be construed in accordance with local laws and jurisdictions (New York).

Privacy: Personal information obtained in connection with this prize drawing will be handled in accordance policy set forth in the McAfee Privacy Notice.

Sponsor:  McAfee, LLC, 2821 Mission College Blvd. Santa Clara, CA 95054

 

 

 

 

 

The post Most Dangerous Celebrities 2017: #RT2Win a Hollywood Worthy Prize appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/dangerous-celebrities-2017-rt2win-hollywood-worthy-prize/feed/ 0
The importance of cyber self-defense education https://securingtomorrow.mcafee.com/consumer/importance-cyber-self-defense-education/ https://securingtomorrow.mcafee.com/consumer/importance-cyber-self-defense-education/#respond Fri, 22 Sep 2017 08:43:08 +0000 https://securingtomorrow.mcafee.com/?p=79021 This blog post was written by Nick Viney. As recent headlines have highlighted, one thing is clear; there is still a lot of work that needs to be done in the world of cybersecurity. Whether it is companies being breached or personal data being offered to the highest bidder, it is an incredibly challenging job […]

The post The importance of cyber self-defense education appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

As recent headlines have highlighted, one thing is clear; there is still a lot of work that needs to be done in the world of cybersecurity. Whether it is companies being breached or personal data being offered to the highest bidder, it is an incredibly challenging job to keep everyone safe online. In order to protect the online world, it is vital that not only are we creating technology and software that can prevent these attacks, but also making investments to help educate individuals on the cybersecurity landscape. So as cybersecurity professionals, should we be doing more and how are tomorrow’s generation making sure they are staying one step ahead?

Only recently, it was reported that cybersecurity firms were facing a chronic shortage of qualified staff. One organisation commented that the pipeline of security talent isn’t where it needed to be and that until the problem was rectified and the quality of education improved, cybersecurity positions would continue to be unfilled. As far back as 2015, Frost & Sullivan forecast a shortfall of 1.5 million would be experienced by 2020, with more recent predictions by Cybersecurity Ventures claiming that figure could be closer to 3.5 million by 2021. The danger of having such a chronic shortfall in cybersecurity professionals is the risk it poses to not just businesses, but individuals as well. As we become more and more reliant on our connected devices, the more exposed and ultimately at risk we are of being targeted by cybercriminals.

Along with the need to upskill at a professional level, improving education much earlier will also help narrow the skills gap. With 12 to 15 year olds spending over 20 hours a week online, it is imperative we find a way to not only educate but also to nurture cyber skills. We need to be encouraging children to explore the digital world and teach themselves the broader cybersecurity skill set that is required in today’s connected world.

Despite this much-publicised shortfall in cybersecurity professionals, is there any hope or are are we going to be considering cybersecurity a career of yesteryear in a few years? If the most recent A-Level results are anything to go by, absolutely not! Whilst there are still some obvious concerns about filling cybersecurity roles, the increase in popularity of Maths and Further Maths at A Levels by nearly 25% since 2010 bodes very well for narrowing that skills gap. As cybersecurity is linked so closely to STEM subjects, the increase in popularity of Maths is incredibly encouraging to see.

With a solid understanding of STEM subjects, students seeking a career in cybersecurity are well equipped to deal with fast-evolving security threats and being able to adapt a dynamic environment but the help needs to start early. Whether it’s support from the Government through to scholarships and internships to teaching young children about how to behave online, we must help individuals today to secure the world of tomorrow, and with the number of cybersecurity jobs in the UK increasing at nearly 20% a year, there is no better time to enter the exciting world of cybersecurity.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post The importance of cyber self-defense education appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/importance-cyber-self-defense-education/feed/ 0
Protect What Matters Most: Details on McAfee’s New Consumer Security Lineup https://securingtomorrow.mcafee.com/consumer/mcafees-new-consumer-security-lineup/ https://securingtomorrow.mcafee.com/consumer/mcafees-new-consumer-security-lineup/#respond Wed, 13 Sep 2017 04:01:06 +0000 https://securingtomorrow.mcafee.com/?p=77897 At McAfee, were always looking to see how we can continue to innovate to better protect consumers everywhere. Whether it’s working to better secure the home, or ramping up our anti-virus offerings, our goal is to provide the best protection possible. To that end, today we’re announcing our new consumer lineup, which has been designed […]

The post Protect What Matters Most: Details on McAfee’s New Consumer Security Lineup appeared first on McAfee Blogs.

]]>
At McAfee, were always looking to see how we can continue to innovate to better protect consumers everywhere. Whether it’s working to better secure the home, or ramping up our anti-virus offerings, our goal is to provide the best protection possible. To that end, today we’re announcing our new consumer lineup, which has been designed to deliver even more efficient and effective protection and better address the threats today’s connected users face as well as key solutions that go beyond traditional AV.

McAfee’s core security suite – which includes McAfee AntiVirus Plus, McAfee Internet Security, McAfee Total Protection and McAfee LiveSafe – now delivers even more efficient and effective protection from digital threats with expanded cloud-based behavioral analytics and machine learning capabilities .

Now, what are the specific enhancements for some of our products?

  • Top of the line anti-malware protection. Available for both PC and mobile, our anti-malware’s detection abilities, including protection against zero-day malware, continue to improve as the engine connects more endpoints and the cloud-based machine learning defends against attacks.
  • Redesigned user interface. This year’s lineup also has a redesigned user interface across both Windows and Mac computers, which highlights security reports aimed at educating and informing users about the latest threats.
  • Good news for Android aficionados. Android users will experience some extra support, as McAfee Mobile Security for Android features enhanced Wi-Fi security and ransomware removal.

Beyond improving the classics, we’re also focusing on innovation—after all, the attack surface has extended far beyond the PC. First off, there’s McAfee Secure Home Platform, which automatically protects all connected devices including Internet of Things devices and appliances on a user’s home network from a variety of threats. Then there’s McAfee Safe Family, which helps parents protect their kids from exposure to inappropriate digital content by providing app and web usage monitoring capabilities, time controls on devices and apps, location monitoring and more. Finally, we have McAfee Safe Connect, which allows users to securely connect to the internet through bank-grade encryption, helping protect them against attempts to capture sensitive information.

Long story short? We’re continually committed to helping consumers live their connected lives with confidence, in the areas that matter most: connected devices in the home, online safety for kids, and online privacy. And who wouldn’t want that peace of mind?

Stay on top of the latest consumer and security news by following @McAfee_Home on Twitter and ‘Like’ us on Facebook.

The post Protect What Matters Most: Details on McAfee’s New Consumer Security Lineup appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mcafees-new-consumer-security-lineup/feed/ 0
Four of the coolest jobs in cybersecurity https://securingtomorrow.mcafee.com/consumer/four-coolest-jobs-cybersecurity/ https://securingtomorrow.mcafee.com/consumer/four-coolest-jobs-cybersecurity/#respond Fri, 01 Sep 2017 13:34:59 +0000 https://securingtomorrow.mcafee.com/?p=77363 This blog post was written by Nick Viney. With the rapid growth of the Internet of Things (IoT) and data breaches, careers in cybersecurity are becoming much more desirable. Many who choose the path come from backgrounds in maths, computer science, history or philosophy, and as technology becomes more prominent, so does cyber crime. A […]

The post Four of the coolest jobs in cybersecurity appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

With the rapid growth of the Internet of Things (IoT) and data breaches, careers in cybersecurity are becoming much more desirable. Many who choose the path come from backgrounds in maths, computer science, history or philosophy, and as technology becomes more prominent, so does cyber crime. A career in cybersecurity goes beyond the stereotypical image of spending all day crunching  numbers and there are many more roles that require expertise. We’ve rounded up some of the more interesting jobs in the wonderful world of cybersecurity;

Job 1 – Forensics Expert

Forensics experts (FEs) are increasingly in demand by corporate and governmental bodies. Similar to crime scene investigators, FEs are usually called in to analyse and determine who the mastermind behind a security breach might be. Although deciphering computer data may not sound fascinating, it can be almost as complex and precise as understanding human DNA.  

By being exposed to large volumes of sensitive information, not only do they need top-notch computer skills, but they must also be able to perform as a law enforcement officer. Together, with a team of lawyers, they’re then asked to render evidence to testify in court against potential hackers. This could include cracking code on electronics, current – as well as deleted – emails, internet activity, social media, stolen data and encrypted passwords.

Job 2  – Cryptographer/ Cryptanalysts

Cryptographers are known as code makers and breakers. Their role is to develop algorithms, ciphers and security systems to encrypt and hide sensitive information from cyber hackers. They protect critical data from being copied, edited or deleted by unauthorised account holders and test security systems for weaknesses to guard businesses or even the government. Good technical skills, creativity and intelligence are the backbone of a successful cryptographer and above all, they must be trusted enough to handle sensitive data.

Job 3 – Threat Hunter

Threat hunters use manual or machine-assisted skills to detect and prepare for security incidents. Their aim is to uncover cyberattacks that businesses or organisations may not otherwise find out about. With so many data threats in today’s ‘always on’ world, typically they lead groups of engineers supporting with monitoring tools, access data and threat research. They need a good understanding of businesses and their operations to be able to detect abnormal behaviours.  

Job 4 – Security Architect

A security architect designs systems to help develop and test the security vulnerabilities of a business or organisation. Almost like designing a home, they spend most of their time creating complex structures for security – and ensuring they work. At times they hire whitehat hackers, also known as ‘penetration or vulnerability testers’ who they can trust to exploit the system and ensure it’s secure from extreme attacks from the outside.  

With the the market for cybersecurity professionals poised for another strong year, there are plenty more increasingly attractive roles out there with equally rewarding responsibilities.    

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

 

The post Four of the coolest jobs in cybersecurity appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/four-coolest-jobs-cybersecurity/feed/ 0
McAfee Applauds “Cyber Scholarship Opportunities Act of 2017” https://securingtomorrow.mcafee.com/business/mcafee-applauds-cyber-scholarship-opportunities-act-2017/ https://securingtomorrow.mcafee.com/business/mcafee-applauds-cyber-scholarship-opportunities-act-2017/#respond Thu, 24 Aug 2017 16:56:19 +0000 https://securingtomorrow.mcafee.com/?p=77205 Sound educational theory and quality academic instruction are crucial.  Understanding real-world, real-time threats is also imperative as our graduating professionals join the workforce and industry’s rapidly changing cybersecurity landscape.  We must find ways to maximize the instruction from both academia an industry, to facilitate our students’—and government’s and industry’s—success.

The post McAfee Applauds “Cyber Scholarship Opportunities Act of 2017” appeared first on McAfee Blogs.

]]>
By Lisa Depew, Head of Industry and Academic Outreach, McAfee

The “Cyber Scholarship Opportunities Act of 2017,” which is sponsored by Sens. Roger Wicker (R-Miss.) and Tim Kaine (D-Va.) and was recently approved by the Senate Commerce, Science and Transportation Committee, is welcome news for those increasingly worried about the cybersecurity workforce shortage. A report written by the Center for Strategic and International Studies last year, “Hacking the Skills Shortage,” sounded the alarm about this shortage, with 82 percent of respondents reporting a skills shortage in cybersecurity and 71 percent citing direct and measurable damage as a result.

This piece of legislation shows that Congress is addressing the workforce shortage head-on, an issue I testified about earlier this year before Chairman Will Hurd’s U.S. Information Technology Subcommittee of the Committee on Oversight and Government Reform. The issues raised during the hearing closely mirror the provisions of the “Cyber Scholarship Opportunities Act of 2017”; a few key points I stressed in April that we’re pleased to see Congress agreeing with are:

Community College Associate’s Degrees

The provision that would provide scholarships for students at community colleges is one we at McAfee have supported. Many attending community colleges do so from adjacent domains in an effort to pursue skills retraining. Bringing these students into the cybersecurity fold will allow the industry to more quickly benefit from their expertise, faster. Scholarships will also attract talented, younger students who have not yet made a commitment, as well as veterans looking to serve in another way. Not every cybersecurity practitioner needs a Ph.D.; there are a variety of roles requiring a diverse range of expertise whereby professionals can be successful contributors in cybersecurity. Diversity of thought will be crucial to success in cybersecurity through its bringing together of a rich set of experiences, perspectives and means of solving problems together.

Part-Time Students

The inclusion of language addressing part-time students is encouraging and indicates an understanding of how the roles and circumstances of many in the American workforce have changed. This widening of the aperture will empower working Americans who might be pursuing their next degree and/or a new skill part-time, and is a step in the right direction.

K-12 Education

Yet another area of focus for this bill that McAfee sees as crucial is increased cybersecurity advocacy in K-12. Recent data from Microsoft shows that European girls become interested in STEM around age 11, but this starts to wane by the age 15, illustrating a need for us to both engage and inspire young women during this critical time.

We’ve encouraged the National Science Foundation (NSF) to add a compulsory volunteer component for middle and high school students to its Scholarship for Service program. Educating at a young age is important because when we build an entire continuum—each stage of cybersecurity experts uplifting and empowering the generation after it—we will move to a more cybersecure posture. Additionally, the overall Scholarship for Service program must be increased, given the size and scale of the cyber skills deficit. In my testimony, I had recommended funding in the range of $180 million, a significant increase from the $50 million spent in 2016. We estimate that funding the program in the $180 million range could fund between 5,000 to 6,000 scholarships each year.  This would make a large dent in the estimated 10,000, yearly gap of cyber security professionals identified in the Federal work force by former Federal CIO, Tony Scott.

While we’re pleased to see this legislation progress, there is still more work to be done. The bill directs the NSF to provide awards to improve cybersecurity education and increase teacher recruitment, but it’s important to remember that cybersecurity is a unique field of study, and thus requires a unique approach to teaching. Industry practitioners have rich and varied experiences that enhance the conversation of how to be an effective cybersecurity professional, and extraordinary insight can be gained from practical, hands-on experience in the field.

Sound educational theory and quality academic instruction are crucial.  Understanding real-world, real-time threats is also imperative as our graduating professionals join the workforce and industry’s rapidly changing cybersecurity landscape.  We must find ways to maximize the instruction from both academia an industry, to facilitate our students’—and government’s and industry’s—success.

Technology changes rapidly—especially in the field of cybersecurity—making it critical to be timely, open, and collaborative to ensure students in the field are benefiting as much as possible. To make them successful, they need the support of the government, real-time insights from the industry, and expertise from teachers to best-prepare them for the exciting, fast-paced world of cybersecurity. But more than that, we must continue working to ensure talented individuals with diversity of thought can help fill the growing IT and cybersecurity skills shortage.

The post McAfee Applauds “Cyber Scholarship Opportunities Act of 2017” appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/mcafee-applauds-cyber-scholarship-opportunities-act-2017/feed/ 0
Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! Part 2. https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility-part-2/ https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility-part-2/#respond Mon, 14 Aug 2017 04:02:21 +0000 https://securingtomorrow.mcafee.com/?p=76875 In the first of this short 2-part series, we covered the basis of why you need to implement security in the AWS cloud, known as the “Shared Responsibility Model”. Advanced attacks, management efficiency across on-premises and cloud environments, and even uncovering Shadow IT, are all challenges you may face moving infrastructure to the cloud. To […]

The post Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! Part 2. appeared first on McAfee Blogs.

]]>
In the first of this short 2-part series, we covered the basis of why you need to implement security in the AWS cloud, known as the “Shared Responsibility Model”. Advanced attacks, management efficiency across on-premises and cloud environments, and even uncovering Shadow IT, are all challenges you may face moving infrastructure to the cloud.

To help address these challenges, we’ve developed our flagship network security solution, McAfee® Network Security Platform (McAfee® vNSP), to work specifically in AWS environments. McAfee Virtual Network Security Platform (vNSP) can be deployed in AWS and actually managed from the same place as on-premises NSP. With McAfee® vNSP in AWS, deployment is automatically scaled with your workloads, and integrates with cloud automation frameworks like Chef™ and Puppet®. Security controls are comprehensive for the network, and include inline IDS/IPS with web application protection, zero-day malware detection, and workload isolation via segmentation and east-west attack detection.

Since testing vNSP in AWS would require both accounts in AWS and our trial software, we’ve worked together with AWS to set them both up together. You can “test drive” a pre-configured combination of vNSP and an AWS EC2 instance for 72 hours, all on us. Within the test drive, you can simulate real-world attack use cases, configure policy, and review reporting dashboards. All you need to do is sign up on this page to get up and running. Enjoy the test drive and secure your cloud!

McAfee® Virtual Network Security Platform (McAfee vNSP) Test Drive on AWS Sign Up

No computer system can be absolutely secure. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Amazon Web Services and AWS are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries. The Chef™ Mark and Chef Logo are either registered trademarks/service marks or trademarks/ service marks of Chef, in the United States and other countries and are used with Chef Software Inc.’s permission. We are not affiliated with, endorsed or sponsored by Chef Software Inc. Puppet is a trademark or registered trademark of Puppet, Inc. and are used in compliance with their trademark policy. No endorsement by Puppet, Inc. is implied by the use of this mark. Copyright © 2017 McAfee, LLC.

The post Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! Part 2. appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility-part-2/feed/ 0
Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility/ https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility/#respond Sun, 13 Aug 2017 12:00:27 +0000 https://securingtomorrow.mcafee.com/?p=76867 There is a presiding notion that because established cloud providers such as Amazon deliver enterprise-class infrastructure, security is “taken care of.” When you set up your workloads in AWS, you hopefully configure available settings like access control and firewall port restrictions. That’s all good, and necessary! But outside of the cloud, would that ever be […]

The post Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! appeared first on McAfee Blogs.

]]>
There is a presiding notion that because established cloud providers such as Amazon deliver enterprise-class infrastructure, security is “taken care of.” When you set up your workloads in AWS, you hopefully configure available settings like access control and firewall port restrictions. That’s all good, and necessary! But outside of the cloud, would that ever be enough?

Hopefully your answer is no. And Amazon agrees. As a customer or prospective user of AWS, you should familiarize yourself with what is known as the “Shared Responsibility Model”, essentially stating where Amazon’s security ends, and your responsibility begins. Here’s their graphical representation:

Fig. 1 The AWS Shared Responsibility Model. For more visit https://aws.amazon.com/compliance/shared-responsibility-model/

If you’re familiar with data center security, server security, or security for virtualized infrastructure, you’re probably not surprised with this breakdown. Encrypting data, running host-based anti-malware, and configuring access control are staples of your practice.

Let’s not forget – the cloud has a network too. And its susceptible to threats just like your own datacenter network, and more specific to the cloud. Advanced malware can reach your AWS workloads through network traffic, along with cross site scripting, botnet, and SQL injection attacks. Cloud infrastructure also has its own vulnerabilities – if one virtual server in AWS is compromised, the malware can potentially roam to other vulnerable servers in the same environment. This lateral path is known as “east-west” network traffic, and is much more prominent in virtualized environments. Additionally, there are unique management challenges in the cloud, like orchestrating security controls across a dynamically changing environment, and automating the process. Not to mention, simply gaining visibility into what workloads are being spun up by your organization!

Moving workloads to the cloud confidently means solving these security challenges as you plan your deployment, not after. If you’re responsible for data center and cloud infrastructure, bring your security team in early. Security professionals – don’t assume security in the cloud will hold back the agility your organization needs.

Stay tuned for part 2 of this short series on protecting cloud networks in AWS for our technology recommendations, and a new way to kick the tires with no investment required.

No computer system can be absolutely secure. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Amazon Web Services and AWS are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries. The Chef™ Mark and Chef Logo are either registered trademarks/service marks or trademarks/ service marks of Chef, in the United States and other countries and are used with Chef Software Inc.’s permission. We are not affiliated with, endorsed or sponsored by Chef Software Inc. Puppet is a trademark or registered trademark of Puppet, Inc. and are used in compliance with their trademark policy. No endorsement by Puppet, Inc. is implied by the use of this mark. Copyright © 2017 McAfee, LLC.

The post Network Security in the Amazon Web Services Cloud – It’s Your Responsibility! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/network-security-in-the-aws-cloud-its-your-responsibility/feed/ 0
The New Intern-Net https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/new-intern-net/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/new-intern-net/#respond Fri, 04 Aug 2017 16:17:32 +0000 https://securingtomorrow.mcafee.com/?p=76726

By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to get top grades, volunteer, participate in sports, play an instrument, and find a cure for a rare disease in my spare time just to get a job interview. And now, on top of this, two […]

The post The New Intern-Net appeared first on McAfee Blogs.

]]>

By Cristina, Channel Team Intern in Plano, Texas.

As a college student today, it often feels like it’s essential to get top grades, volunteer, participate in sports, play an instrument, and find a cure for a rare disease in my spare time just to get a job interview. And now, on top of this, two relatively new words are at the forefront of every college students’ worries and every recruiter’s checklist: internship experience.

This is where McAfee comes in. In case you haven’t heard, McAfee has given 147 high school and college students around the globe the opportunity to gain real world experience through a variety of internships. I am grateful to be one of the college interns with the chance to work full time to acquire a greater grasp on business operations, and perhaps most exciting of all, from a broke student perspective, get paid for it. As an intern at McAfee, I am acquiring valuable experiences, skills, and relationships as well as being given an edge in my future career.

McIntern Perspective

There are many perks to being an intern.

For instance, the Plano interns have fun excursions together, such as a laser tag and whirly ball teambuilding session and unique networking events. In addition to that, speakers have taught us key skills, like how to build a strong personal brand and provided insight into our own personality types in a workplace context.

To me, one of the most valuable aspects of this internship is that, instead of wandering into an arbitrary position after graduation, I get to shadow dozens of coworkers in a wide range of areas. Doing this has helped me find the roles I am most drawn to explore in the future and get an overview on how different parts of the company tie together.

Ultimately, my favorite experience so far has been the Channel Team Meeting. The entire North American Channel Team descended upon Plano for two days of training and teambuilding. I already knew McAfee was a cool place to work; a fully equipped game room and dogs on Fridays was enough to convince me of that. But two full days with the whole team proved the people are truly remarkable too.

One of the teambuilding activities was the Amazing Chase scavenger hunt. We ran around Plano in the stifling heat of a Texas summer and completed fun and silly challenges. I was a member of a top-notch team which included the Senior Vice President of Global Channel Operations as well as the Director of Channel Sales. Despite being surrounded by brilliant people with imposing titles, I did not feel like ‘just’ an intern. In fact, the scavenger hunt was a good representation of my overall experience at McAfee. We all play to win and we each have role in our team’s level of achievement, regardless of status. Even as an intern, I want to deliver to McAfee as much value as it offers to me.

#IAmMcAfee

Like many in my generation, I want meaningful work from a company that aims to better our society. By nature, cybersecurity matters. The rapidly evolving industry is crucial to protecting everything from our families to our nations. I feel privileged to intern for a business that makes a positive impact and truly cares. McAfee sets the bar high in these areas and I will accept nothing less than this in the future.

In the end, this opportunity will be indispensable for me and many of the interns in shaping our upcoming professions and catapulting us towards our dream careers, whether those lie at McAfee, elsewhere in the cybersecurity industry, or just in an area of interest from coding to sales. I am McAfee because my internship experience here provides me a platform for success.

For more stories like Cristina’s, follow @McAfee on Twitter.

The post The New Intern-Net appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/new-intern-net/feed/ 0
Is It Hackable? Our New Podcast Intends to Find Out https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/hackable-new-podcast-intends-find/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/hackable-new-podcast-intends-find/#respond Tue, 01 Aug 2017 23:37:02 +0000 https://securingtomorrow.mcafee.com/?p=76776 Cyberattacks are becoming more and more prevalent. It seems like every day there’s another story about a cybercriminal attacking something new – an IoT teddy bear, support call logs, the list goes on. So, in light of these cybercrimes, McAfee has created a new podcast, called to explore what exactly makes these attacks successful. This […]

The post Is It Hackable? Our New Podcast Intends to Find Out appeared first on McAfee Blogs.

]]>
Cyberattacks are becoming more and more prevalent. It seems like every day there’s another story about a cybercriminal attacking something new – an IoT teddy bear, support call logs, the list goes on. So, in light of these cybercrimes, McAfee has created a new podcast, called to explore what exactly makes these attacks successful. This 25-minute-long podcast takes hacks heard about in the news or seen on TV, and puts them to the test. Taking over the Wi-Fi at a bustling cafe, tapping into the computer of a moving vehicle, infiltrating someone’s webcam – these are just a few of the cyberattacks carried out by the crew of Hackable?.

In the first episode of Hackable?, Geoff Siskind, with the help of cybersecurity experts, tries to uncover the truth about how risky it is to use free Wi-Fi. In this episode, Geoff and team provide some key insights and details on the history of public Wi-Fi attacks. Then, with permission of the store owner, they head to a local coffee shop to conduct a real-world experiment and replicate a Wi-Fi hack that was featured in the show Mr. Robot.

In this Dallas café, the team sets up an Evil Twin access point and makes a malicious network appear to be from a national cellular carrier in the effort of hopefully attracting its customers. If these users connect to the malicious network, cybercriminals will gain access to their device.

And, as it turns out, about 22 people fell for the ploy, which permitted the McAfee team to see quite literally anything they wanted to on those devices. At this point, cybercriminals could inject malicious code into a webpage if they want to. So, if a victim opens their browser, they could actually be downloading malware.

To stay protected from this kind of attack, Geoff and the team recommends using a VPN (virtual private network), as well as staying cautious when joining unofficial public Wi-Fi networks.

So, if you’re eager to learn more about what makes cybercriminals tick or just need a little entertainment for your morning commute, make sure you listen to “Hackable?”, which is now available for download on any of the sites below:

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

 


{
"metadata": {
"id": "0c59b652-e1ab-4088-ba91-d24bd8dc8a5a",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/hackable-our-new-podcast/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "false",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1574025873444561.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1574025873444561.jpg",
"pubDate": "Tue, 1 Aug 2017 12:35:48 +0000"
}
}

The post Is It Hackable? Our New Podcast Intends to Find Out appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/hackable-new-podcast-intends-find/feed/ 0
Cybersecurity 101: Top Takeaways from Our Back to School Study https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/cybersecurity-101-top-takeaways-back-school-study/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/cybersecurity-101-top-takeaways-back-school-study/#respond Mon, 31 Jul 2017 18:38:32 +0000 https://securingtomorrow.mcafee.com/?p=76567 The end of summer is almost here, which means both parents and their kids are starting to gear up for the new school year. Of course, the first homework assignment and first day outfits are top of mind, however, these teens will be thinking about their devices too — what devices they can bring to […]

The post Cybersecurity 101: Top Takeaways from Our Back to School Study appeared first on McAfee Blogs.

]]>
The end of summer is almost here, which means both parents and their kids are starting to gear up for the new school year. Of course, the first homework assignment and first day outfits are top of mind, however, these teens will be thinking about their devices too — what devices they can bring to class, what they’ll post about school events, etc. But will they be thinking about what they need to do to keep these devices secure? To see how students approach device use and security in the classroom, we conducted a survey, Cybersecurity 101: Teens in the Classroom, of more than 3,900 high school students (9th-12th grade) around the world. Here are a few of our key takeaways: 

Students Are Devoted to Their Devices

Between social media and smart devices, kids are staying connected now more than ever before. And it looks like the use of these connected devices in the classroom is here to stay. 86% of students spend at least one hour per day using an internet-connected device during school hours for school-specific work. Technology has just become an everyday part of the classroom experience for students, as more than half (57%) of students spend three or more hours per day using a connected device during school hours for school-specific work.

But, it’s important to note, this connected work isn’t always done with pure intentions, as almost half of students (47%) claim to have seen or heard of another student using a connected device in the classroom to cheat on an exam, quiz, project or other assignment – with only 21% admitting to doing it themselves. Students are also defying the rules when it comes to cybersecurity restrictions as well. When it comes to getting around cyber restrictions put in place by schools, 24% of the students have successfully accessed banned content. Beyond that, almost half (45%) of the students were able to access any (21%), or some (24%) social media sites on school-owned connected devices.

Education Goes Beyond Normal Curriculum

So, what exactly is being done to address this defiance? Fortunately, both administration and teachers are actively trying to employ policy as well as educate these kids on why cybersecurity is so important. 80% of students surveyed think that their school takes the necessary steps to ensure at least the school-owned devices they use are protected from cyberthreats. And most students (86%) feel up-to-date and informed about cybersecurity education/guidelines from their school before accessing school-owned connected devices.

Why Is Security Is Still Struggling?

So, given schools are providing this education, the question is – why do security gaps still exist? The study discovered that, as teens age, cybersecurity education becomes less of a priority for parents. 50% of parents of children 14 to 15-years old regularly talk about staying safe online, but this percentage dropped to 30% for older teenagers 16 to 18-years old. Shockingly, 14% of 16 to 18-year olds have never talked with their parents about how to stay safe online.

Therefore, as a parent, it’s crucial you begin making cybersecurity a priority for your teens. To do just that, follow these tips:

-Talk to your teens. The best way to ensure your teen is staying safe online is to talk to them. Ask them about what they do online and encourage safe behavior like avoiding interacting with individuals they don’t know in real life.

-Use the social networks that your kids are using. Not only will you gain a better understanding about what your kids do online, but you will also become a more trusted source because you will know the ins and outs of their favorite apps/networks.

-Protecting all your devices. Be sure to install comprehensive security software, like McAfee LiveSafe, across all of your family’s devices. Having security software is essential to protecting your family’s devices and privacy.

And for teens, it’s important to keep the following pointers in mind for when you’re using your connected devices next:

-Mind what you share. Personal information should be shared in moderation and only when necessary. Also, ensure that you are enabling privacy settings within social networks. Without privacy setting enabled your profile is open to everyone, which could increase the chances of being bullied or personal photos being downloaded and manipulated.

-Keep passwords private. Avoid sharing passwords with anyone other than parents or guardians. Once you share your password you no longer have control of your account.

As for schools themselves, we have a few additional tips on how you can continue to improve your cybersecurity education:

-Create student contracts in the classroom. The first step to creating guidelines for devices in class is to clearly spell out the terms of a ‘classroom device usage’ so there is no room for misunderstanding. Certain conditions such as staying on task and being considerate of others’ privacy must be upheld by students for devices to be used for in-classroom work.

-Keep parents updated and involved. Parents need education too. Schools should frequently update parents about how technology is used in the classroom setting. Not only does this promote understanding and support from parents but, equally importantly, it helps bridge the technology gap between parents and their kids.

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

 


{
"metadata": {
"id": "0ff182d9-216b-46a5-9f8a-05e80abbbd88",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/back-to-school-study/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "false",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1574187893517605.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1574187893517605.jpg",
"pubDate": "Mon, 31 July 2017 12:35:48 +0000"
}
}

The post Cybersecurity 101: Top Takeaways from Our Back to School Study appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/cybersecurity-101-top-takeaways-back-school-study/feed/ 0
Running from Ransomware: A Mobile User’s Guide https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/running-ransomware-mobile-users-guide/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/running-ransomware-mobile-users-guide/#respond Tue, 25 Jul 2017 21:06:31 +0000 https://securingtomorrow.mcafee.com/?p=76406 From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy lunches, conquer the stack of unwashed dishes in the sink from the night before, and make sure that everyone is out the door on time. […]

The post Running from Ransomware: A Mobile User’s Guide appeared first on McAfee Blogs.

]]>
From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy lunches, conquer the stack of unwashed dishes in the sink from the night before, and make sure that everyone is out the door on time. One day, in  the midst of all the usual mania, I had a horrible realization that I had forgotten to buy my mom’s birthday present.

To save myself some time, I whipped out my phone, scrolled through the net and explored a few last-minute gift options. In the corner of my eye, I saw an ad for some cute shoes she’d like from a retail site I had previously visited. Zoom, tap, bam! Browsing history comes through to help me find a present in the blink of an eye.

Last-minute online shopping isn’t the only thing our connected devices are good for. We rely on our mobile phones for the simplest things to navigate through our daily lives. From mapping directions, to scrolling through nearby restaurant reviews, to quickly scanning newsworthy articles, our devices accumulate a lot of personal data through our browsing history.

Although browsing history has come handy for me in certain situations, it often gets a bad rap on its own. Leaker Locker, the new mobile malware discovered by the McAfee team, has created a browsing history nightmare by leveraging surfing habits against mobile users.

When we’re navigating through the net, we usually (often wrongfully) assume that our information will remain private. Unfortunately, that’s not always the case. Our increased trust of the web and dependence on our connected devices has excited cybercriminals, causing the number of mobile malware threats to grow over 80% in the last year.

Hiding behind apps that can be found in the Google Play store, Leaker Locker harnesses its malicious ransomware by disguising itself as an unauthorized mobile backup. Present on two apps on the Google Play store, this ransomware disguised as an app leaves the everyday consumer, like you and me, vulnerable.

So how does Leaker Locker work? It attacks when the user allows device permissions to the newly downloaded, disguised app. Once the malicious app gains access to the device, the device is locked down, and a message pops up on-screen, announcing  that the owner’s sensitive information has been compromised. This private information is then used as a bargaining chip for a ransom.

Want to make sure you’re not the next victim of this ransomware? Follow these tips:

  • Attention, Please: Scope out the app’s listing on the app store, and read through its reviews carefully. Sure, an app might look like a fun game or seem to make your life convenient, but it pays to be vigilant. Many users leave helpful warnings to others about if a specific app has been disguised as a hub for ransomware. If the reviews or actual app listings seem fishy, steer clear.
  • Don’t Pay to Play: Cybercriminals love to demand money in exchange for the “safety” of your personal data. Although paying the ransom seems like a good idea, don’t fall for this trap! Paying the ransom doesn’t guarantee the return of your information. Be extra cautious and try to keep sensitive data off your mobile device.
  • Back It Up: Back up your personal information and files by taking advantage of both an external hard drive and the cloud. In the event that you get locked out of your mobile device, you’ll still have access to important data. This back up plan will give you a better peace of mind.

Mobile ransomware has been making headlines, and cybercriminals don’t plan on stopping anytime soon. Get educated and be familiar with their actions. To cover all of your bases, consider turning to a mobile security solution like McAfee Mobile Security (MMS) for Android. With newly designed features that allow you to browse more securely on mobile, MMS provides real time malware (ransomware included) detection capabilities. Most importantly, it gives you the power to safeguard against threats like Leaker Locker a single tap.

Interested in learning more about mobile security tips and trends? Follow @McAfee_Home on Twitter, and like us on Facebook.


{
"metadata": {
"id": "37c4937f-f4fe-417f-8916-557f2b69ab5c",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/mobile-security/leaker-locker-mobile-malware/",
"author": "Radhika Sarang",
"author-page": "https://securingtomorrow.mcafee.com/author/radhika-sarang/",
"category": "Mobile Security",
"draft": "false",
"authordetail": "Radhika Sarang currently serves as Director of Global Consumer Product Marketing at McAfee, and has worked in a strategic marketing capacity for top tier high tech companies since 1998. Prior to joining McAfee, Radhika led product marketing for Nokia’s social location consumer division, and also served as the Sr. Product Manager for Palm’s WebOS devices.",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1573835167903955.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1573835167903955.jpg",
"pubDate": "Tue, 25 July 2017 12:35:48 +0000"
}
}

The post Running from Ransomware: A Mobile User’s Guide appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/running-ransomware-mobile-users-guide/feed/ 0
The Kids are in Charge https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/the-kids-are-in-charge/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/the-kids-are-in-charge/#comments Wed, 19 Jul 2017 20:22:17 +0000 https://securingtomorrow.mcafee.com/?p=76174

By Ribu, Communications Manager  Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children liven up McAfee’s India Development Center on our annual Kids@Work Day. This annual gathering transforms our Bangalore site from an everyday office to a Wonderland. It is very common to see the kids dressed as […]

The post The Kids are in Charge appeared first on McAfee Blogs.

]]>

By Ribu, Communications Manager 

Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children liven up McAfee’s India Development Center on our annual Kids@Work Day.

This annual gathering transforms our Bangalore site from an everyday office to a Wonderland. It is very common to see the kids dressed as their favorite Disney characters, and joining in on painting, magic and even an employee-led puppet show. We also give kids problem-solving challenges and encourage them to explore and learn as much as they can.

We love seeing the awe and excitement from children as they get a glimpse of what their mom or dad do every day at work (we are yet to break the news to them that we don’t dress up as Disney characters EVERY day!). And working in cybersecurity where there’s a clear talent shortage in this space, it’s important we do our bit to show future generations what a STEM education could provide them.

McAfee volunteers from across the organization pitch in to make this annual event the success that it is. It’s no small task organizing an action-packed event that will meet the needs of these inquisitive minds. The fact that this event continues to grow in size and grandeur every year, shows the passion and commitment from parents and from McAfee.

It’s incredibly encouraging to see each of us working together to create a fun, energy-filled and festive atmosphere at McAfee. We can’t wait to see what’s in store for our next Kids Day in India!

Take Your Child to Work programs were originally established in 1992 by Australia, the United States, and Canada as a response to research showing a lack of confidence in young girls leading to a high dropout rate. Since then the programs have moved from the education system to the corporate world, expanded to include young boys and found their ways to other cultures and emerging cities. McAfee is proud to do its part in embracing the great history of Bring Your Child to Work programs. Our Kids’ Day event is just one way McAfee is redefining its culture and creating new relationship builders for McAfee employees. Learn about McAfee culture and vision!

The post The Kids are in Charge appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/the-kids-are-in-charge/feed/ 1
123456 Is Not an Acceptable Password in 2017 https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/123456-not-acceptable-password-2017/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/123456-not-acceptable-password-2017/#respond Tue, 11 Jul 2017 21:24:06 +0000 https://securingtomorrow.mcafee.com/?p=76417 Mirror, mirror on the wall, what is the safest password of them all? We all know using a secure password is one of the best practices for protection on the web, but we don’t always practice what we preach. We’ve all been guilty of using our first street address or our first pet’s name as […]

The post 123456 Is Not an Acceptable Password in 2017 appeared first on McAfee Blogs.

]]>
Mirror, mirror on the wall, what is the safest password of them all?

We all know using a secure password is one of the best practices for protection on the web, but we don’t always practice what we preach. We’ve all been guilty of using our first street address or our first pet’s name as passwords, and dedicating that one login to all of our online accounts for the sake of simplicity. I can even admit that there was once a time that my phone was PIN-free—it’s just plain easier, and faster. I understand the long sigh that comes with having to sign in every time you want to use a device. However, it’s never a good idea to trade security for convenience, especially with devices or accounts that hold information as personal as your bank info or family address. Complex passwords help protect your online banking account, emails, and personal information from being accessed by prying eyes.

Yes, secure logins are a crucial layer for account protection, but in all honesty, humans are creatures of habit. We love to use the same password for multiple accounts, use easy-to-remember birthdays or nicknames, or simply don’t change default passwords on devices.

Recent breaches have reminded us that passwords should always take priority (they’re so important, we’ve acknowledged a World Password Day dedicated to changing your passwords!). History has shown us that hackers love and live for bad passwords, so using poor passwords for important accounts will increase your vulnerability to a hack. To make sure that you don’t a commit a security faux pas, check out this secure password checklist:

  • Don’t Use a Real Word: If your password contains a word from the dictionary, nix it. Don’t use the name of your favorite flower or the name of your pet. Instead, consider using either a made-up word, mix of ‘slang’ words, or even gibberish. The more complicated, the better!
  • Mix It Up: As almost all password readers are case-sensitive, consider using a mix of upper- and lowercase letters to be extra secure. Throw in some numbers and symbols to complicate the password, and stay away from your standard birthday or ‘123456’ password.
  • Use the Default and You’ll Be At Fault: All “smart” devices are equipped with default passwords, from your new smart thermostat to the drone you just got for your birthday. As soon as you take your gadget out of the box and set it up for use, change the password immediately, and make sure you update these passwords regularly.
  • “One Size Fits All” Doesn’t Apply: Don’t use the same password for multiple accounts. Although it may seem like a hassle to remember these passwords, the can’t-beat security will be worth the extra effort down the line. Password management solutions like True Key are helpful to keep track of all your login info, as well as generate secure, unique passwords for you.

It’s important to remember to change passwords early, and change them often, across all devices—this makes it extra difficult for cybercriminals to access your personal information. Protecting accounts and devices from their wired connection up to their web logins will help keep hackers at bay.

Interested in learning more about mobile security tips and trends? Follow @McAfee_Home on Twitter, and like us on Facebook.

The post 123456 Is Not an Acceptable Password in 2017 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/123456-not-acceptable-password-2017/feed/ 0
Coming Home To Vote for Marriage Equality https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/coming-hometovote-marriage-equality/ https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/coming-hometovote-marriage-equality/#respond Tue, 11 Jul 2017 19:56:27 +0000 https://securingtomorrow.mcafee.com/?p=75917

By Chris, Localization Engineer Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for gender and sexual minorities in the workplace. As part of a small group of citizens invited by the Irish Government to form the first Irish Constitutional Convention, he helped the effort for the referendum on […]

The post Coming Home To Vote for Marriage Equality appeared first on McAfee Blogs.

]]>

By Chris, Localization Engineer

Chris is a localization engineer for McAfee in Cork, Ireland, who is passionate about inclusivity for gender and sexual minorities in the workplace. As part of a small group of citizens invited by the Irish Government to form the first Irish Constitutional Convention, he helped the effort for the referendum on equal rights in Ireland that ultimately led to Ireland becoming the first country in the world to protect equality in their constitution by popular vote. He is currently completing his Master’s degree in Personal and Management Coaching, examining the experiences of gender and sexual minorities in helping relationships.

The #hometovote hashtag is said to be one of the most influential campaigns that helped Ireland embrace equality in the 2015 referendum (and if you haven’t read this article – you should). It’s significant to me for two reasons.

Firstly, it symbolizes the huge societal shift in Ireland – the multitudes returning home from abroad to vote for equality. The referendum became a topic in churches, and many elderly even skipped Mass to go vote yes for their LGBTQ children and grandchildren! Secondly, by appealing to the friends and family of those in the Lesbian, Gay, Bisexual, Transgender, Questioning (LGBTQ+) community, it reinforced a simple fact that ultimately, we all just want the best for one another.

There’s some important lessons in stories like this as we look at acceptance in the workplace. Namely, we all have the power to help shift and challenge perceptions to create an inclusive, open and accepting environment for everyone. The LGBTQ community come to work every day, just like you. They need not be strangers so get to know them and embrace the opportunity to cultivate empathy and understanding for minorities that you work side by side with each morning.

I try to practice this inclusivity at McAfee and help shed light on what it’s like to identify as a minority population. I came out nearly 15 years ago, and while I’ve seen huge progress, there’s of course more we can do to create an accepting environment where everyone can bring their true, authentic self to work.

I talk about this topic as part of the work I do for McAfee’s LGBTQ+ Allies program. Often, people don’t know where to start and how to show their support. Practicing a little cultural humility can go a long way towards bridging a knowledge gap. Simple things like just asking questions can help dispel the myth that people in the LGBTQ+ community don’t want to share their personal lives with folks from outside the community. We have mortgages and cats and squabbles over household chores just like everyone else.

I also encourage others to create some reflection in the workplace. Even if you don’t identify as a minority, there are small but important things you can do to create a culture of inclusivity. Even if it’s just asking about a LGBTQ colleague’s partner, husband or wife. The LGBTQ community are innovative and resilient: they’ve had to be in the face of societal marginalization and so have developed many and varied ways to sustain their relationships. We should all play our part in creating a culture where it’s ok to discuss our personal lives and our community, no matter what shape or form it takes.

At McAfee, I genuinely have never felt I had to be anyone else. I’m a gay man and I’m proud of it. And more than that, the Cork management team are supportive and encouraging of my efforts to set up initiatives like inclusivity training to tackle unconscious bias or run educational events.

Knowledge is certainly power, and all underrepresented minorities are incredible sources of experience and cultural information. I’m proud to work for a company that not only recognizes the potential of a diverse workforce, but works hard to make sure everyone feels welcome. Together truly is power.

For more stories like this, follow @LifeAtMcAfee on Instagram and on Twitter via @McAfee to see what working at McAfee is all about.

Interested in joining our team? We’re hiring. Apply now!

The post Coming Home To Vote for Marriage Equality appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/life-at-mcafee/coming-hometovote-marriage-equality/feed/ 0
Millions of Android Devices Hit With CopyCat Malware https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/millions-android-devices-hit-copycat-malware/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/millions-android-devices-hit-copycat-malware/#respond Tue, 11 Jul 2017 17:50:46 +0000 https://securingtomorrow.mcafee.com/?p=75992 Time and time again, we’ve seen Android malware make its way through mobile devices around the world. Now, a new mobile malware is here, and it has infected at least 14 million Android devices. Dubbed CopyCat, the malware has been found running a successful adware campaign, stealing credits earned by legitimate advertisers in the process. […]

The post Millions of Android Devices Hit With CopyCat Malware appeared first on McAfee Blogs.

]]>
Time and time again, we’ve seen Android malware make its way through mobile devices around the world. Now, a new mobile malware is here, and it has infected at least 14 million Android devices. Dubbed CopyCat, the malware has been found running a successful adware campaign, stealing credits earned by legitimate advertisers in the process.

The way CopyCat malware works is fairly simple. CopyCat spreads to users’ phones either through third-party app downloads or phishing. Once it has made its way to a device, the malware roots Android devices and injects its code into Zygote, a daemon tasked with launching apps on Android devices, which gives the malware a strong hold on affected devices. This allows the malware to then insert itself into the activity of all running apps.

From there, CopyCat commits both ad and app fraud by stealing credits earned by legitimate advertisers whenever one of their ads results in an application download, which are ultimately exchanged for revenue. This specific technique has never been seen before, and is actually more lucrative than traditional ad fraud. Plus, it’s experienced quite a bit of success already, as it claimed a whopping $1.5 million during a peak two-month period in 2016.

While the majority of victims of CopyCat are in Asia, more than 280,000 Android devices in the US have been hit by the attack. Therefore, no matter where you are, it’s important to start thinking of how to protect your Android device from this attack. To do just that, follow these tips:

-Always use legitimate app stores. Many victims of CopyCat were infected by downloading apps from third-party stores unaffiliated with Google Play. It’s crucial users only download applications from official stores, like Google Play or the Apple App store, to ensure they don’t become part of larger malware schemes like CopyCat.

-Keep your software updated. Even if you do avoid third-party app stores, remember that CopyCat can still spread through phishing scams. Therefore, to protect your devices from the attack, ensure all software is up-to-date, as updates typically include additional protection against emerging malware strains, such as CopyCat.

-Use a mobile security solution. As malware and adware campaigns continue to infect mobile applications, make sure your mobile devices are prepared for any threat coming their way. To do just that, cover these devices with a mobile security solution, such as McAfee Mobile Security.

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.


{
"metadata": {
"id": "e8325c5f-2aed-47fd-8797-a9a40",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/learn-phishing-phone/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "true",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1572672918033810.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1572672918033810.jpg",
"pubDate": "Mon, 10 April 2017 12:35:48 +0000"
}
}

The post Millions of Android Devices Hit With CopyCat Malware appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/millions-android-devices-hit-copycat-malware/feed/ 0
The ‘Beginners Guide To IoT’ https://securingtomorrow.mcafee.com/consumer/beginners-guide-iot/ https://securingtomorrow.mcafee.com/consumer/beginners-guide-iot/#respond Tue, 11 Jul 2017 08:43:35 +0000 https://securingtomorrow.mcafee.com/?p=75901 This blog post was written by Nick Viney. You’ve probably heard the term ‘smart’ being placed in front of everyday objects such as watches, locks and even cars. Over the past couple of years, the term is being used more than ever as more devices become ‘smart’. These devices now impact nearly every aspect of […]

The post The ‘Beginners Guide To IoT’ appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

You’ve probably heard the term ‘smart’ being placed in front of everyday objects such as watches, locks and even cars. Over the past couple of years, the term is being used more than ever as more devices become ‘smart’. These devices now impact nearly every aspect of our lives but, as a consumer, where do you begin to understand the ‘Internet of Things’ or IoT? With so many of us relying on the internet and the cost to connect decreasing, more and more devices are being built with Wi-Fi and sensor capabilities to enable us to get connected.

As the name suggests, IoT refers to the connection between an object and the Internet, with the purpose of making products ‘smarter’ and allowing users to operate devices from afar, whether that’s from a computer or other smart device. For example, a smart lock would lock and unlock a door when it receives authorisation from its user’s Wi-Fi-connected device. Similarly, an alarm or smoke detector that is ‘smart’ would alert the homeowner if their home was under the threat of a fire or burglary, as well as collecting the home’s behavioural patterns along the way.

So how does IoT work? Usually connected via Bluetooth, Wi-Fi or Radio-Frequency Identification (R-FID), devices or ‘Things’ collect and transmit data between each other, allowing users to gain control of an object such as a TV, car or a household appliance. This process is called machine-to-machine (M2M) communication.

IoT is playing a larger role in our everyday lives and is being applied to more and more industries each day. Fridges, washing machines and even medical healthcare monitors are all becoming smart and a consequence of this is the risk of security and privacy breaches much closer to home. It is therefore critical that consumers are protecting themselves appropriately and making sure their data doesn’t end up in the wrong hands.

Here are a few tips we’d recommend running through to protect yourself:

1. A simple Google search will allow you to research products in depth before and after purchasing them from a trustworthy company — this way you are aware of any vulnerabilities your product may have and can take the necessary measures to protect your privacy.

2. Secure your router and IoT devices with firmware like the McAfee Secure Home Platform and ensure they’re set with strong passwords to avoid any unauthorised access.

3. Lastly, consider two-step authentication — this can boost your device’s security even further and reduce the chances of hackers breaching them.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post The ‘Beginners Guide To IoT’ appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/beginners-guide-iot/feed/ 0
The Trends & Challenges Facing The Internet Of Things https://securingtomorrow.mcafee.com/consumer/trends-challenges-facing-internet-things/ https://securingtomorrow.mcafee.com/consumer/trends-challenges-facing-internet-things/#respond Tue, 11 Jul 2017 08:28:24 +0000 https://securingtomorrow.mcafee.com/?p=75894 This blog post was written by Nick Viney. The Internet of Things, or IoT, is now commonplace in society today. Since the term was first coined back in the 80’s, connected devices have changed our lives in ways many of us could only dream of. However, whilst the growth has been significant, integrating IoT devices […]

The post The Trends & Challenges Facing The Internet Of Things appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

The Internet of Things, or IoT, is now commonplace in society today. Since the term was first coined back in the 80’s, connected devices have changed our lives in ways many of us could only dream of. However, whilst the growth has been significant, integrating IoT devices into everyday life even further is not without its challenges. In this post, I’m going to look at some of the trends that will help take IoT integration even further, as well as some of the hurdles being faced.

Trends

Hands Free

Today, the most common way of interacting with IoT devices and electronics is primarily touch. However, the ability to use voice is shaking up how consumers and technology interact. Voice is making a significant impact on our everyday lives and it will continue to become more prominent as the technology evolves. Very recently, we’ve seen the introduction of Amazon’s Alexa and Google’s Home devices. With the likes of Siri, Cortana and Assistant already being used outside of smartphones and tablets, it will only be a matter of time before consumers are controlling their IoT devices by voice. It has even begun to make its way into cars, as we’ve seen with Nissan introducing Cortana to the dashboard interface. Using our hands could well become a thing of the past!

Big Data & Machine Learning

At the very core, big data and IoT need each other. Both are powerful trends that are reshaping the way consumers and businesses operate. However, the value of IoT for big tech firms isn’t just in the hardware, it also lies in the huge amounts of data the devices are producing. Data is becoming the ‘new oil’ and IoT devices increase the amount of data companies have on consumers, making them incredibly valuable. Companies will start to use Artificial Intelligence (AI) to analyse the huge pools of data allowing them to provide a much more tailored offering with devices eventually beginning to learn and adapt to how we use them. With AI integration, it gives companies the ability to analyse data and learn, with devices ultimately becoming automated — a fundamental shift in how consumers interact with their devices.

Challenges

Safety & Security

With more devices becoming connected and even more planned for the future, one of the biggest elements that needs to be addressed to make IoT a success is making sure devices are safe and secure. A recent report from Gartner predicted there will be 8.4 billion connected ‘things’ in 2017 and as many as 20 billion by 2020 — a huge amount of devices that if breached, could at the very least expose critical user data, but could also do much worse when we consider how connected hospitals and cities are becoming. If we take hospitals for example, an attack on the network could have huge ramifications on patients so as the reliability on technology increases, the security must mirror that. Looking at things much closer to home, implementing the right security platforms, like our Smart Home software will make sure cyber attacks on your connected devices in the home don’t happen.

Multiple Devices

As we’ve mentioned before, the exponential growth of IoT means more and more devices will be using a network, which will in turn place an incredible amount of strain on our networks. The result of an overburdened network could mean a drop in service, which is something most businesses and consumers would be keen to avoid. How many times has your internet connection dropped or your WiFi cut out for a few seconds? It’s not uncommon in the home today and the consequences are probably minimal, but imagine that happening for businesses — it could be catastrophic. Seamless integration is critical for the successful use of IoT.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post The Trends & Challenges Facing The Internet Of Things appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/trends-challenges-facing-internet-things/feed/ 0
How to Protect Your Child from Identity Theft in 8 Easy Steps https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protect-child-identity-theft-8-easy-steps-2/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protect-child-identity-theft-8-easy-steps-2/#respond Tue, 27 Jun 2017 19:35:20 +0000 https://securingtomorrow.mcafee.com/?p=75835 With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor the status of your child’s identity? If you look at the growing risks, monitoring your child’s identity — starting as early as birth — could become as important as regular dental check-ups. Identity fraud is […]

The post How to Protect Your Child from Identity Theft in 8 Easy Steps appeared first on McAfee Blogs.

]]>
With all the things to knock out on your parenting to-do list, when’s the last time you thought to monitor the status of your child’s identity? If you look at the growing risks, monitoring your child’s identity — starting as early as birth — could become as important as regular dental check-ups.

Identity fraud is at an all-time high with 15.4 million U.S. victims in 2016, up 16 percent, according to the latest Javelin Strategy study. An earlier Javelin report focusing on child identity theft estimated that 1 in 40 U.S. households with children under age 18 had at least one child whose personal information had been compromised by thieves.

Sadly, anyone with a name and a social security number (SSN) is prone to identity theft — yes, even our children. Identity thieves are increasingly using children’s SSNs since theft in this age group often goes undiscovered for extended periods of time, often until the child grows up and applies for a car or student loan. Thieves often use a child’s identity to apply for government benefits, to open bank and credit card accounts, apply for a loan or utility service, or rent a place to live.

These ambivalent thieves don’t play favorites and have learned the hot spots for child identity data: schools, pediatrician offices, banks, (stealing) mom’s purses, and (robbing) home offices. A growing area of concern involves medical identity theft, which gives thieves the ability to access prescription drugs and even expensive medical treatments.

8 things parents can do:

  1. Educate your kids. Talk candidly to your child about identity theft and the fallout. Help your child understand the tricks of those who make a living stealing the identities of others. Instruct them to keep private information private and to ask you for permission before sharing personal information with anyone.
  2.  Alert your kids to online scams. Identity thieves will befriend children online and chat them up for private information with the goal of using that information to steal their identity. Thieves are skilled at trolling social networks looking at user profiles for birth dates, addresses, and names of family members to piece together the identity puzzle.
  3. File a fraud alert. By submitting a fraud alert in your child’s name with the credit bureaus several times a year, you will be able to catch any credit fraud early. Since your child hasn’t built any credit, anything that comes back will be illegal activity. The fraud alert will remain in place for only 90 days. When the time runs out, you’ll need to reactivate the alert. You can achieve the same thing by filing an earnings report from the Social Security Administration. The report will reveal any earnings acquired under your child’s social security number.
  4. Know the warning signs. If a thief is using your child’s data, you may notice: 1) Pre-approved credit card offers addressed to them arriving via mail 2) Collection agencies calling and asking to speak to your child 3) Court notices regarding delinquent bills.If any of these things happen your first step is to call and freezetheir credit with the three credit reporting agencies:  Equifax, Experian, and TransUnion.
  5. Get security software. One safeguard against identity theft of any kind is full device security such as McAfee LiveSafe™ service.
  6. Be aware of data risks. Thieves can get your child’s information in several ways. For example, a family member may want to use a child’s identity to start over, or a parent may have a questionable girlfriend or boyfriend living in the home or visiting often. Another way information gets stolen if a parent loses a wallet, purse, or personal paperwork that has a child’s SSN information on it. A digital security breach at a bank, pediatrician’s office, or business could also land your child’s information in criminal hands.
  7. Get fierce about protecting your child’s data. Draw a very thick line when it comes to sharing your child’s SSN as well as secondary information such as date of birth, address, and mothers’ maiden name. Also, never carry your child’s (or your) physical Social Security card in your wallet or purse. Keep it in a safe place, preferably under lock and key, where thieves can find it. Only share your child’s data when necessary (school registration, passport application, education savings plan, etc.) and only with trusted individuals.
  8. Report theft. If you find a violation of your child’s credit of any kind, your first step is to call IdentityTheft.gov to report the crime and begin the process of restoring your child’s credit. This will include 1) Filing a report with the FTC online or call 877-438-4338; 2) filing a police report; 3) contacting credit agencies and request the removal of all accounts, inquiries, and collection notices linked with your child’s name and SSN; 4) contacting creditors and request they close any account associated with your child’s SSN; 5) keeping a detailed journal of every person you contacted, the dates and times, and notes on each conversation.

This pro-active mindset can be a bit unnerving. However, with the current data spills, the weekly news regarding security breaches have started to lose their shock factor. Taking these few steps and getting fierce about data protection can save your child (and you) countless hours and even years of credit headaches. Identity theft can affect a job search, a mortgage rate, and sadly, even a victim’s self-esteem for years to come.

Toni Birdsong is a Family Safety Evangelist to McAfee. You can find her on Twitter @McAfee_Family. (Disclosures).

 

The post How to Protect Your Child from Identity Theft in 8 Easy Steps appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protect-child-identity-theft-8-easy-steps-2/feed/ 0
Security Risks Arise From Insecure Implementations of HTML5 postMessage() API https://securingtomorrow.mcafee.com/business/security-risks-arise-insecure-implementations-html5-postmessageapi/ https://securingtomorrow.mcafee.com/business/security-risks-arise-insecure-implementations-html5-postmessageapi/#respond Thu, 25 May 2017 03:15:40 +0000 https://securingtomorrow.mcafee.com/?p=74367 This blog was written by Mayank Sharma. In this post we are going to have a look at the security risks arising due to insecure implementation of the HTML5 postMessage()API. Before we discuss how this cross-domain messaging API works, we must understand a few important concepts such as the same-origin policy and security risks associated […]

The post Security Risks Arise From Insecure Implementations of HTML5 postMessage() API appeared first on McAfee Blogs.

]]>
This blog was written by Mayank Sharma.

In this post we are going to have a look at the security risks arising due to insecure implementation of the HTML5 postMessage()API. Before we discuss how this cross-domain messaging API works, we must understand a few important concepts such as the same-origin policy and security risks associated with cross-origin communications.

Same-origin policy

The origin of a page is decided by three unique factors: hostname, protocol, and port number. For example, http://test.com and https://test.com have different origins because the protocol is different. Similarly, http://one.test.com and http://two.test.com have different origins because the hostnames are different. The origin property is also different for two services running on the same host with different port numbers, for example, http://test.com:8081 and http://test.com:8082 are different origins.

The same-origin policy (SOP) is a browser-level security control that dictates how a document or script belonging to one origin can interact with a resource from some other origin. Basically, SOP prevents scripts running under one origin from reading data from another origin. Cross-domain requests and form submissions are still permitted, but reading data from another origin is not permitted. SOP does not prevent resources hosted on different domains from being embedded in a page by using <script> tags, cascading style sheets, and <img> tags.

In a world without SOP, the Internet would not be very safe. Imagine you are logged into your bank’s website and simultaneously are accessing a news site in another tab. If the news site can read data from your bank’s site, you do not have to be a security expert to understand the risk.

Need for cross-origin communication

SOP has done a good job protecting users from unauthorized cross-domain data access, though like many other security controls it does not boost usability. The Internet has evolved beyond individual websites serving content and has become more distributed. The need arose to enable secure cross-domain communication to allow services hosted on different domains to communicate with each other. The postMessage() API, introduced in HTML5, tries to provide a safe mechanism. (There are other methods for cross-domain communication such as using HTTP response headers, but we will not discuss those here.)

Cross-origin messaging

The Window.postMessage() method, introduced in HTML5, allows JavaScript code running on different origins to communicate with each other in a bidirectional manner. This API can be used for communication between an iframe and its parent document. Similarly, it can be used by an HTML page and a child window to exchange messages, such as an embedded third-party video notifying its parent frame when the user pauses the video. Let’s look at some code snippets to better understand how cross-origin messaging works.

Consider an HTML page hosted on http://www.test.com that contains an iframe element pointing to http://www.child-frame.com. The parent frame can use the postMessage() call on the window object of the iframe to send a message.

//The following JavaScript code will be part of the parent document
//iframe example
var iframe = document.getElementsByTagName(‘iframe’)[0];
iframe.contentWindow.postMessage(“hello”, “*”);
——————————–OR—————————————–
// pop-up window example
var ref = window.open(“http://childframe.com”);
ref.postMessage(“hello”, “*”); 

In the preceding code snippet the iframe element is fetched and in the next step the contentWindow property of the iframe is accessed, which returns a window object reference. The postMessage() call contains two parameters, the message string and the target domain.

In the pop-up window example, in which messages are to be exchanged between the parent document and a child pop-up window, the reference returned by window.open() can be used to call the postMessage() API.

//The following JavaScript code will be a part of the child frame
window.addEventListener(‘message’, msgHandler);
function msgHandler(event)

{
// The sender’s origin and data received are displayed
alert(event.origin+‘says:’+ event.data);
}

On the receiving end, we need to have an event listener to listen for an incoming message. The preceding msgHandler() method is triggered when an event is received. The dispatched message contains certain properties that can be accessed by using the event object reference:

  • event.data: Object sent from the sender window (arrays, strings, numbers and other JavaScript objects are supported)
  • event.origin: Origin of the sender window
  • event.source: A reference to the window object of the sender window. This can be used to send a message to the sender window.

Risk analysis and protection measures

Let’s look at a couple of elements from a developer’s perspective:

  • It is important to specify the origin of the target window while sending a cross-origin message to ensure that the message is received by the intended recipient.
  • On the receiving end, it is important to validate the origin of the sender to check the integrity of the message received.
  • Using the received data in the client-side logic without validation may open doors for script-injection attacks.

The API specification provides very clear guidelines to developers for securely using the postMessage()API. (See this link to the specification.) The code snippets shown earlier do not follow these best practices while implementing the postMessage() API. Let’s look at the compliant code snippets.

//The following JavaScript code will be part of the parent document
var iframe = document.getElementsByTagName(‘iframe’)[0];
//The postMessage call specifies the target origin rather than using wildcards
iframe.contentWindow.postMessage(“hello”, “http://www.child-frame.com”); 

The preceding code explicitly mentions the target origin. The previous example used a wild card, which offers no guarantee that the message will be delivered to the intended origin. This omission may result in a vulnerability when an iframe or a pop-up tries to communicate with its parent because a malicious site could open a legitimate website in a pop-up or iframe.

Similarly, on the receiving end, the authors should check if the message is received from an expected origin. Along with origin verification, it is important to perform input validation on the data received from the other domain before using it in the client-side logic. The compliant code solution for the receiving end follows:

//The following JavaScript code will be a part of the child frame
window.addEventListener(‘message’, msgHandler);
function msgHandler(event)

{
// The sender’s origin is validated
if (event.origin == “http://www.test.com”)

{
if(event.data == “hello”)

{
//Do some action after validating the message content
}

}

}

Demonstration of an attack

Consider the (fictional) credit card rewards program website https://www.acmerewards.com, which is running a promotional campaign. Customers are asked to play a quick game of Sudoku with the week’s highest scorers receiving reward points. The game is hosted on https://play.acmerewards.com. This URL opens as a pop-up from the main site’s home page.

The link to this game is shown to customers after they are authenticated. Once the pop-up opens, the main site passes the name of the current user to the pop-up window. The game window uses this to create a welcome message.

The vulnerability arises because the pop-up window assumes that it will always receive the message from www.acmerewards.com and thus does not validate the sender’s origin and the contents of the message. Because it is possible to open the pop-up window from any HTML page, the post message can be sent by any malicious domain. The message can contain malicious JavaScript code, which could run in the context of http://play.acmerewards.com, resulting in script injection that can be exploited in many ways. We will use a locally deployed application to demonstrate this attack. The initial screenshots show the expected application behavior. The final screen shows the script-injection attack using a post message.

The home page (www.acmerewards.com) of the rewards application. Clicking the PLAY button opens a pop-up window.

The pop-up window opens (play.acmerewards.com). Clicking OK in the sender window (www.acmerewards.com) sends the post message to the pop-up window. The two windows have different origins.

The string “username” is sent as a message from the sender window and is used to create a welcome message by the pop-up window.

We see the final exploit scenario in which a malicious website (www.realbadhacker.com) opens a pop-up window that points to a legitimate URL and passes a cross-site scripting payload instead of the username in the message. This script runs in the context of the target domain, which is trusted by the user.

The attack takes place completely on the client side; there is no interaction with the server. This “client XSS” attack avoids any server-side control that might have helped detect or prevent the attack. Both the source and sink of this attack occur on the client, and the injected malicious scripts are never sent to the server. The vulnerability should be fixed in the client-side code by validating the sender’s origin and data received.

The code for this demo application can be found here. Code samples provided in this post have been tested with Mozilla Firefox Version 52.0.1.

Reference

https://html.spec.whatwg.org/multipage/comms.html#web-messaging

The post Security Risks Arise From Insecure Implementations of HTML5 postMessage() API appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/security-risks-arise-insecure-implementations-html5-postmessageapi/feed/ 0
Protecting Your Privacy on Social Media https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protecting-privacy-social-media-2/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protecting-privacy-social-media-2/#respond Wed, 24 May 2017 20:54:18 +0000 https://securingtomorrow.mcafee.com/?p=76399 Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But, the kind of information you share and whom you share it with can make a big difference between having a positive experience on social media, and putting your money and private details at risk. Sites like Facebook and […]

The post Protecting Your Privacy on Social Media appeared first on McAfee Blogs.

]]>
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But, the kind of information you share and whom you share it with can make a big difference between having a positive experience on social media, and putting your money and private details at risk.

Sites like Facebook and Twitter, and social apps like Instagram, have not only become a part of our everyday lives, they have also become a popular place for hackers and scammers to create fake accounts and look for victims. They use social media sites to spread dangerous links that lead to malware, or phishing attempts. They may also impersonate people you know to request money or valuable information, or even gather your own private details to steal your identity. That’s why securing your social media accounts is so important.

Here are a few tips for protecting your privacy on some of the biggest social networks.

Facebook

The social media giant has recently put more effort into helping users secure their account. Their Privacy Checkup tool allows you to review and adjust your privacy settings to control who sees your posts, what you share, and how your profile looks to other people, among other options.

Facebook occasionally prompts you to go through a Privacy Checkup, but you can do it manually at any time. Consider selecting the highest security settings, including blocking messages from strangers and restricting access to your profile so that “Friends Only” can see your posts and tag you.

You’ll also want to take advantage of Facebook’s extra security features, such as enabling two-factor authentication. This means that the site will verify that you are trying to login to your account by taking a second measure, like sending you a text message with a code to enter when logging into your account.

To adjust your settings, click on the lock icon at the top of any Facebook page and select “Privacy Checkup.”

Twitter

Twitter is a bit more open than Facebook, since it allows anyone to follow you (although you can block a follower later if you choose). You can improve your privacy by being careful about the information that you share. Keep personal information out of your profile and consider selecting the “Protect My Tweets” option, which allows you to filter who sees your tweets, rather than having them all go public.
Once again, make sure that no one else takes over your account by enabling two-factor authentication. You can also request verification whenever a password reset is attempted.

These settings and more can be found by clicking on the gear icon in Twitter’s upper right-hand corner.

LinkedIn

Since this is a professional networking site, people are generally more cautious about posting information about their private lives, but it’s still worth taking some time to make sure that your profile is secure. By default, anyone can see your education, photo, work experience and other details. You will want to change the settings to make sure that your profile is only visible to people you accept into your network. You can also restrict access to “connections only” when it comes to viewing your activity feed.

The site has been integrated with Twitter and other authorized applications, so you will want to ensure that your privacy isn’t being leaked onto other platforms without your knowledge. Only allow access to applications that you trust and use.

You can manage these settings by clicking on the “me” icon at the top of your LinkedIn homepage, and then selecting “Privacy & Settings.”
No matter which social networking sites you use it’s important to find a balance between sharing and engaging with others and making sure that your privacy is protected.

Here are some tips to help protect you on all social networks:

  • Be careful about how much personal information you share in the first place. Avoid posting your home address, full birth date and employer information, as well as your exact location while you are there.
  • Check your privacy settings regularly, as they often change.
  • Choose strong, unique passwords for all your accounts and take advantage of two-factor authentication.
  • Disable the sharing of location information.
  • Be wary of messages and friend requests from strangers. Never click on a link sent by someone you don’t know.
  • Block people and applications you don’t trust.
  • Think twice before taking online quizzes and surveys that ask for personal information.
  • If you no longer use a social media account, delete your information and deactivate your account.
  • Always use comprehensive security software to protect you from viruses, malware and other online threats.

Looking for more mobile security tips and trends? Be sure to follow @McAfee Home on Twitter, and like us on Facebook.

 


{
"metadata": {
"id": "e8325c5f-2aed-47fd-8797-a9a40",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/protecting-privacy-social-media/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "false",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/05/img_1567238951494530.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/05/img_1567238951494530.jpg",
"pubDate": "Mon, 10 April 2017 12:35:48 +0000"
}
}

The post Protecting Your Privacy on Social Media appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/protecting-privacy-social-media-2/feed/ 0
WannaCry: When the Theoretical Becomes Real https://securingtomorrow.mcafee.com/business/wannacry-theoretical-becomes-real/ https://securingtomorrow.mcafee.com/business/wannacry-theoretical-becomes-real/#respond Thu, 18 May 2017 01:05:23 +0000 https://securingtomorrow.mcafee.com/?p=74244 This blog was written by Brian Dye. I’ve spent many years talking to audiences – corporate customers, government leaders, and everyday people – about cyberthreats both real and possible. But what happened over last weekend with the “WannaCry” threat feels like a point at which “future threats” become “now threats” in many people’s minds. We’ve […]

The post WannaCry: When the Theoretical Becomes Real appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

I’ve spent many years talking to audiences – corporate customers, government leaders, and everyday people – about cyberthreats both real and possible. But what happened over last weekend with the “WannaCry” threat feels like a point at which “future threats” become “now threats” in many people’s minds.

We’ve all known for decades about hackers, information thefts, computer viruses etc. But when a hospital’s information systems get locked, and lives are at stake, think pieces about the “Future of Cybersecurity” don’t seem so distant. The future is now.

The on-going WannaCry attack, which started last Friday, is the first time we’ve seen worm tactics combined with ransomware on major scale. The outbreak has already infected 350,000 victims in more than 150 countries.

WannaCry’s success comes down to its ability to amplify one attack through the vulnerabilities of many machines on the network, making the impact greater than what we’ve seen from traditional ransomware attacks. (See Steve Grobman’s blog on the intricacies of the attack here).

We are protecting you, at Day Zero and beyond

McAfee technology provided Day Zero protection against the WannaCry attack, not just at the endpoint but across many aspects of an integrated security architecture.  More than ever, threats like WannaCry remind us that an integrated defense is the best defense because it enables you to protect, detect and respond to the newest and most challenging threats:

  • McAfee Endpoint Security (ENS) 10.2 (or later) running Dynamic Application Containment (DAC) in Secure mode gave full Day Zero protection against WannaCry.
  • ENS, Threat Intelligence Exchange (TIE) and Advanced Threat Defense (ATD) operate together as a zero touch, closed loop security defense system. This system provided effective prevention, detection and response of the attacks at Day Zero as ATD identified the attacks as malicious, allowing the McAfee integrated defense architecture to automatically update defenses across the remaining environment.
  • McAfee Active Response (MAR) delivered trace data that revealed malicious activity at Day Zero, helping responders identify the attack and update defenses across the environment.
  • McAfee Network Security Platform: our IPS used its Signatureless and protocol anomaly engine to detect the backdoor planted on compromised machines, and has updated signatures to protect against the SMB RCE attacks as well as the Eternal* tools.

For customers on older endpoint technology, McAfee researchers analyzed samples of the ransomware immediately upon detection then updated McAfee Global Threat Intelligence (GTI) and released an emergency DAT and new HIPS signatures for extra coverage.  I strongly encourage all our customers to join the millions of end users who have already upgraded to McAfee Endpoint Security v10.5 to enjoy the advanced technology and zero-day protection capabilities it provides.

The Big Picture

Though there is an immediate threat to be met, it’s important to keep an eye on the Big Picture. Now, more than ever, the “new threat, new widget” approach must evolve. It’s not sustainable to continue frantically filling cracks in a foundation that is sinking; we must begin building the proper foundation to begin with.

McAfee’s belief is that an effective defense is built on a dynamic cybersecurity platform that is both open and integrated. Open, so it can quickly accept new technologies that protect against even the most creative adversaries; and integrated in that technologies work together as a cohesive defense.

Those integrated defenses were on clear display in protecting our customers during this worldwide episode.  Leveraging an automated security system that protects, detects and corrects in real time allows users to both free up resources and thwart advanced attacks.  An integrated endpoint platform ensures that people have both the latest technologies today and the ability to add the newest technology year after year.  As a result, users no longer have to choose between the best technology and the most manageable – they can have both.

Together is power.

 

To read more about how McAfee products protect against WannaCry, read How to Protect Against WannaCry Ransomware in a McAfee Environment.”

 

The post WannaCry: When the Theoretical Becomes Real appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/wannacry-theoretical-becomes-real/feed/ 0
Congrats to our 2017 Women of the Channel https://securingtomorrow.mcafee.com/business/congrats-2017-women-channel/ https://securingtomorrow.mcafee.com/business/congrats-2017-women-channel/#respond Mon, 15 May 2017 14:00:38 +0000 https://securingtomorrow.mcafee.com/?p=73845 This blog was written by Richard Steranka. I’m proud to announce that CRN has recognized five McAfee women for their ability to create and elevate channel partner programs, develop fresh go-to-market strategies, strengthen the channel’s network of partnerships and build creative new IT solutions. As part of this recognition, Jimena Acevdeo, channel programs and enablement […]

The post Congrats to our 2017 Women of the Channel appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

I’m proud to announce that CRN has recognized five McAfee women for their ability to create and elevate channel partner programs, develop fresh go-to-market strategies, strengthen the channel’s network of partnerships and build creative new IT solutions. As part of this recognition, Jimena Acevdeo, channel programs and enablement manager; Pamela Boich, director, worldwide channel operations; Allison Clarke, director of global partner programs and enablement; Regan Ogner, senior director of global distribution sales; and Natalie Tomlin, director of channel sales, have been named to CRN’s prestigious 2017 Women of the Channel list.  Natalie Tomlin has also been named to the 2017 Power 100, an elite subset of its prestigious annual Women of the Channel list.

The executives who comprise this annual list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. Each is recognized for her outstanding leadership, vision and unique role in driving channel growth and innovation within their respective companies.

CRN editors select the Women of the Channel honorees based on their professional accomplishments, demonstrated expertise and ongoing dedication to the IT channel. The Power 100 belong to an exclusive group drawn from a larger list of women leaders whose vision and influence are key drivers of their companies’ success and help move the entire IT channel forward.

The 2017 Women of the Channel list is featured in the June issue of CRN Magazine and online at www.CRN.com/wotc.

Congrats again to these amazing women!

Jimena Acevdeo

 

Pamela Boich

 

Allison Clarke

 

Regan Ogner

 

Natalie Tomlin

The post Congrats to our 2017 Women of the Channel appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/congrats-2017-women-channel/feed/ 0
Why You Need to Watch Out When Using Public Wi-Fi https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/need-watch-using-public-wi-fi-2/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/need-watch-using-public-wi-fi-2/#respond Fri, 12 May 2017 23:18:41 +0000 https://securingtomorrow.mcafee.com/?p=76328 If you’re like most people, you like to stay connected whether you are traveling or just on the go. That’s why it can be tempting to connect to free, public Wi-Fi networks, but you should know that these networks could open you up to some serious risks. Public Wi-Fi networks often lack a security measure […]

The post Why You Need to Watch Out When Using Public Wi-Fi appeared first on McAfee Blogs.

]]>
If you’re like most people, you like to stay connected whether you are traveling or just on the go. That’s why it can be tempting to connect to free, public Wi-Fi networks, but you should know that these networks could open you up to some serious risks.

Public Wi-Fi networks often lack a security measure called encryption, which scrambles the information sent from your computer or device to the router so strangers cannot read it. Without this security measure in place, the information you send over these networks can potentially be intercepted by cybercrooks.

This information could include your banking and social media passwords, as well as your identity information. A nosy cybercriminal could also potentially snoop on you by watching which websites you visit, and what you type into web forms.

In fact, it is so easy to steal your information over unsecured networks cybercrooks sometimes setup malicious Wi-Fi hotspots in high-traffic areas, like airports, with the intention of grabbing users’ information.

That’s why if you have to connect when you’re away, you should only use secure and well-advertised Wi-Fi networks. You can usually tell if they use encryption because they require a password to join.

If you have to do something sensitive online, like check your bank account balance or make a purchase, try to stick to webpages that start with “HTTPS” rather than just “HTTP”. The “S” stands for secure, and indicates that the site uses encryption to protect your data. You can also look for a green lock icon at the beginning of the browser address, which indicates that the website connection is secure.

If you are on your mobile phone, you can skip the Wi-Fi network altogether and connect using the cellular network. It is somewhat more secure, since it’s harder for cybercrooks to sniff out your individual data from others on the network.

If you travel a lot, consider investing in a Virtual Private Network (VPN), which is a piece of software that allows you to create a secure connection to another network over the Internet. Anyone potentially trying to snoop on you will only see that you are connected to the VPN, and not what you are doing.

Of course, the most important thing is to remember that using public Wi-Fi is always risky, and requires some extra steps to protect your data.

Here are some more tips to help keep you safe:

  • Think twice before connecting to any public Wi-Fi network, especially if it does not require a password to join.
  • Avoid using free, public computers. Cybercriminals sometimes place compromised computers in legitimate Wi-Fi hotspots with the intention of spreading malware or stealing your data.
  • Try to save sensitive transactions, like banking and online shopping, for your secure home or work networks.
  • If you do use a public network, stick to sites that begin with “HTTPS” so you know they are secure. The HTTPS Everywhere browser extension can direct you to encrypted pages when available. Also, look for the green lock icon in the browser’s address bar.
  • When using your laptop, make sure to turn off “sharing” of your folders and devices so no one else on the network can access them. A quick web search can tell you how to do this on your operating system.
  • Use comprehensive security software and keep it up-to-date. If your software includes a firewall, make sure to enable it.

Looking for more mobile security tips and trends? Be sure to follow @McAfee Home on Twitter, and like us on Facebook.


{
"metadata": {
"id": "8b1d65e0-06ab-41b9-8199-7c09ab353f3b",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/need-watch-using-public-wi-fi/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "false",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/05/img_1567214188285244.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/05/img_1567214188285244.jpg",
"pubDate": "Fri, 12 May 2017 12:35:48 +0000"
}
}

The post Why You Need to Watch Out When Using Public Wi-Fi appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/need-watch-using-public-wi-fi-2/feed/ 0
Is That Email Attachment Malware in Disguise? How to Protect Yourself From a Spear Phishing Scam https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/email-attachment-malware-disguise-protect-spear-phishing-scam/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/email-attachment-malware-disguise-protect-spear-phishing-scam/#respond Tue, 25 Apr 2017 16:47:38 +0000 https://securingtomorrow.mcafee.com/?p=76281 The term phishing is floating all over the news these days. And no, I’m not misspelling the fun sport where you try to reel in some seafood for dinner. I mean the type of cyberattack that uses social engineering, aka manipulation, online to trick someone into giving up their personal data. Some of the most […]

The post Is That Email Attachment Malware in Disguise? How to Protect Yourself From a Spear Phishing Scam appeared first on McAfee Blogs.

]]>
The term phishing is floating all over the news these days. And no, I’m not misspelling the fun sport where you try to reel in some seafood for dinner. I mean the type of cyberattack that uses social engineering, aka manipulation, online to trick someone into giving up their personal data. Some of the most recent and powerful examples of a spear phishing attack are the Shamoon2 attacks we’ve seen in Saudi Arabia, which infected machines with malware and destroyed systems through a specific type of phishing called spear phishing.

So, how did this specific spear phishing attack work, exactly? Cybercriminals targeted specific organizations in Saudi Arabia with emails that included malicious attachments in them. Then, when victims clicked and opened the attachment, they were infected, valuable company data was taken and systems were quickly wiped.

Spear phishing has been around for quite some time, but has been as effective as ever lately. Spear phishing’s success is based in familiarity. Usually, cybercriminals pretend to be an organization or individual that you know, and include a piece of content—a link, an email attachment, etc.—that they know you’ll want to interact with. For example, cybercriminals have taken advantage of tragedies in the headlines, and used targeted emails claiming to be a charitable organization asking for donations. In the case of Shamoon2, the attackers lured in victims with a tempting email attachment sent from organizations the victims were likely to trust. But instead of giving to their charity of choice, or opening a seemingly harmless workplace attachment, victims then self-infect their systems with malware.

Moral of the story: spear phishing (and regular phishing) attacks can be tricky. However, fear not, there’s a lot you can do to stay on top of this threat, as well as protect your inbox and, therefore, your personal data, from attack. For starters:

-Go straight to the source. Spear phishing attacks can be easily deceiving. In fact, cybercriminals have been able to impersonate known, credible charities or an employer’s business partners and customers. So, if you receive an email from an organization asking for donations or a partner asking you to open a file you didn’t request, a good rule of thumb is to go directly to the organization through a communications channel other than email. Go to the company’s site and do more research from there. That way, you can ensure you’re gaining accurate information and can interact with the right people, rather than cyber-attackers.

-Always check for legitimacy first. Spear phishing emails rely on you—they want you to click a link, or open an attachment. But before you do anything, you always need to check an email’s content for legitimacy. Hover over a link and see if it’s going to a reliable URL. Or, if you’re unsure about an email’s content or the source it came from, do a quick google search and look for other instances of this campaign, and what those instances could tell you about the email’s legitimacy.

-Stay educated. In response to events such as Shamoon2 spear phishing attack, McAfee is increasing its investments to research, investigate, and, where possible take down the people behind the attacks. We’ll get you the latest information so you can protect yourself. In fact, our Strategic Intelligence team recently uncovered a lot of helpful details available on the latest Shamoon2 attack. So, make sure you check in on all announcements that come from the team to stay clued in on what cyberthreats are emerging and how you can protect yourselves from them.

And, of course, stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

 


{
"metadata": {
"id": "1ef21f1b-2788-448c-95d9-08a8f3403018",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/spear-phishing-attacks/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "false",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/04/img_1565701445670790.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/04/img_1565701445670790.jpg",
"pubDate": "Tue, 25 April 2017 12:35:48 +0000"
}
}

The post Is That Email Attachment Malware in Disguise? How to Protect Yourself From a Spear Phishing Scam appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/email-attachment-malware-disguise-protect-spear-phishing-scam/feed/ 0
Learn About Phishing By Phone https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/learn-phishing-phone-2/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/learn-phishing-phone-2/#respond Mon, 10 Apr 2017 22:01:58 +0000 https://securingtomorrow.mcafee.com/?p=76237 By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal information or sending money, usually via email—but what about “vishing”? Vishing, or voice phishing, is basically the same practice, but done by phone. There are a few reasons why it’s important for you to know about vishing. […]

The post Learn About Phishing By Phone appeared first on McAfee Blogs.

]]>
By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal information or sending money, usually via email—but what about “vishing”? Vishing, or voice phishing, is basically the same practice, but done by phone.

There are a few reasons why it’s important for you to know about vishing. First off, voice phishing scams are prevalent and growing. A common example around tax season is the IRS scam, where fraudsters make threatening calls to taxpayers pretending to be IRS agents and demanding money for back taxes. Another popular example is the phony tech support scam, in which a scammer calls you claiming that they represent a security provider.

The scammers may say they’ve noticed a problem with your computer or device and want money to fix the problem, or even request direct access to your machine. They could also ask you to download software to do a “security scan” just so they can get you to install a piece of malware that steals your personal information. They might even try to sell you a worthless computer warranty, or offer a phony refund.

These kinds of attacks can be very persuasive because the scammers are employing “social engineering.” This is when you are manipulated into doing something for fraudulent purposes. Since the scammers can reach you at any time on your most private of devices, your smartphone, it can feel more direct and personal.

Vishing scams don’t always require a phone call from a real person. Often, the scammers use a generic or targeted recording, claiming to be from your bank or credit union, for instance, asking you to enter your bank account number or other personal details, opening you up to identity theft.

The incoming number could even appear to come from your bank, thanks to a trick called “caller ID spoofing,” which allows the scammers to fake the origin of the call. They can do this by using Voice over Internet Protocol (VoIP) technology, which connects calls over the internet instead of traditional phone circuits, allowing them to easily assign incoming phone numbers.

Don’t risk losing your money or valuable personal information to these scams. Here’s how to avoid vishing attacks:

  • If you receive a phone call from either a person or a recording requesting passwords, personal information or money, just hang up
  • Be skeptical of the caller ID—even if a call appears to be coming from a legitimate business, it could be a spoofed ID
  • If you think your bank may be calling you, but aren’t sure, hang up and call your bank back directly to confirm any potential issue. If you know it was a scam call purportedly coming from your bank, call your bank immediately to make them aware of the problem.
  • Keep up-to-date on the latest phishing scams so you know what to look out for. Also, be aware that phishing attacks via text message are also common.
  • When it comes to tech support, know that a trustworthy internet security provider like McAfee® will never call you out of the blue, requesting money, information, or access to your devices
  • Register your mobile phone number, as well as your home phone, on the “do not call” registry to reduce your exposure

Looking for more mobile security tips and trends? Be sure to follow @McAfee Home on Twitter, and like us on Facebook.

 


{
"metadata": {
"id": "e8325c5f-2aed-47fd-8797-a9a40",
"version": "1.0",
"ep": "ta",
"lang": "en-us",
"original-url": "https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/learn-phishing-phone/",
"author": "Gary Davis",
"author-page": "https://securingtomorrow.mcafee.com/author/gary-davis/",
"category": "Consumer Threat Notices",
"draft": "true",
"authordetail": "Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice. Follow Gary Davis on Twitter at @garyjdavis",
"tinyimage": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1573478062196741.jpg",
"feedimageurl": "https://securingtomorrow.mcafee.com/wp-content/uploads/2017/07/img_1573478062196741.jpg",
"pubDate": "Mon, 10 April 2017 12:35:48 +0000"
}
}

The post Learn About Phishing By Phone appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/learn-phishing-phone-2/feed/ 0
Day Two and Beyond https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/day-two-beyond/ https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/day-two-beyond/#respond Wed, 05 Apr 2017 12:00:04 +0000 https://securingtomorrow.mcafee.com/?p=71076 This blog was written by Brian Dye. It’s not often we get a chance to work on something truly amazing. To be a part of something new. But this week marks one such occasion. It’s a re-invention of one of the industry’s best known names. For someone like me who’s been around a few years, […]

The post Day Two and Beyond appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

It’s not often we get a chance to work on something truly amazing. To be a part of something new.

But this week marks one such occasion.

It’s a re-invention of one of the industry’s best known names. For someone like me who’s been around a few years, this is a great opportunity to help shape a company from the outset and try new ideas. I know that this is the kind of chance that comes only once or twice in a career.

Added to that is the fact that our industry – cybersecurity – is growing and moving faster than any other segment of IT. And McAfee is right in the center of what’s happening.

I don’t need to re-quote figures on the problems with cyber-attacks and security threats on the Web. It’s something we are all aware of. All you have to do is read a news site or pick up a newspaper. Security is probably the biggest challenge of the Digital Age.

Last year we introduced 18 new products. Organically. We developed four integrated security systems. We moved forward, fast, on our industry partnerships, which are now over 125. And we surprised the industry by open-sourcing DXL.

We are working in a special organization — one of the largest pure-play cyber security companies in the world — with a fantastic team of over 2,000 engineers, at a time when what we do is needed by the world more than ever. So it’s time to pause (just for a minute!) and reflect.

Chris envisions McAfee as the most respected, most trusted brand in cybersecurity. When we become the company we know we can be, we’ll be our customers’ #1 partner.

The future is open. What’s your opinion? I’d like to hear from you.

Best,

Brian

 

The post Day Two and Beyond appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/day-two-beyond/feed/ 0
Is Rapid Tech Growth Leaving Your Family’s Digital Safety in the Dust? https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/rapid-tech-growth-leaving-familys-digital-safety-dust/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/rapid-tech-growth-leaving-familys-digital-safety-dust/#respond Tue, 14 Mar 2017 19:35:47 +0000 https://securingtomorrow.mcafee.com/?p=70428 It’s an exciting time to be alive, no doubt. We’ve evolved from tech enthusiasts to social connectors, to a to a culture steeped in a sophisticated digital lifestyle. Ease, speed, and efficiency drives every purchase. Still, the inconsistency hums: The more connected our families become, the more insecure we can feel about exactly how to protect them. The […]

The post Is Rapid Tech Growth Leaving Your Family’s Digital Safety in the Dust? appeared first on McAfee Blogs.

]]>
It’s an exciting time to be alive, no doubt. We’ve evolved from tech enthusiasts to social connectors, to a to a culture steeped in a sophisticated digital lifestyle. Ease, speed, and efficiency drives every purchase. Still, the inconsistency hums: The more connected our families become, the more insecure we can feel about exactly how to protect them.

The recent global study from McAfee, “New Family Dynamics in a Connected World,” confirms that while we are all increasingly connected, we’re still confused about the best way to secure our family from threats such as social predators and cyber criminals.

The rise in popularity of the smart home and its many connected devices has experts predicting that by 2020, “there will be more than 10.5 billion ‘things’ in homes worldwide.” Yes, the Internet of Things, IoT, is proliferating by the hour.

But with the growth of an IoT lifestyle, new family challenges are surfacing, according to the study.

Here’s a snapshot:

  • 76 percent of parents allow their child to bring an internet-connected device to bed.
  • 80 percent of parents are concerned about their child interacting with a predator or criminal online.
  • Only 23 percent of parents admit to using software to monitor their children’s activity on their devices (most parents physically monitor or take phones to manage and limit use).
  • 34 percent of parents have caught their kids visiting inappropriate sites using their device.
  • 36 percent of parents have been called out by their child for being on their device during family time.

The study reveals that for all our genuine concern around online safety, our digital safety habits are struggling to keep up with the pace of technology.

“While there is tremendous excitement for the conveniences that today’s technology brings, we know the weakest link in those devices within a connected home put consumers at risk,” said Gary Davis, chief consumer security evangelist at McAfee. “We must empower parents to actively manage how their families interact with those devices. When the correct security and privacy measures are taken, consumers will feel more protected enabling them to fully enjoy all the benefits of living in a smart home.”

So how do we course correct and begin to close this gap?

Tips: Keep Family Safety in Step with Pace of IoT:

  • Start talking, start early. It’s never too early to talk to your kids about online safety. Fold talks about safety into your routine much the way you would talk about fire safety, nutrition, or good manners. If your kids are young, start with simple rules like “don’t open emails from people you don’t know.”
  • Get back to basics. Sometimes our unspoken worry over an issue can obstruct our view to simple solutions. Try these basics: 1) As a family, set device time and usage rules and post them in a visible place. Set up a reward system if it helps. 2) Routinely check privacy settings, friend lists, and email on your child’s favorite social networks. 3) Implement a device curfew. Physically have kids turn in phones at a set time each night to protect sleep.
  • Be the digital example. If you want to get serious about changing your digital habits, be the example of a balanced digital life for your kids. Limit your time on social networks when at home, put your phone away during dinner and family time.
  • Be honest with challenges.  Share your digital mishaps and near misses with your kids. They need to know you aren’t perfect and learn from how you handled a digital situation such as cyberbullying, a political argument, a hacking incident, or even a tech addiction.
  • Be candid about risks. Digital natives can be desensitized to potential risks online and even develop a false sense of security. This attitude opens them up to social predators or a dangerous person posing as a teen (catfish). The risks are offline too and apply to common services such as Uber*, Lyft* and Craigslist*. Observe your child. If she seems overly confident, blows off your safety concerns, it’s time to step up the stranger danger talk. ***

 

The post Is Rapid Tech Growth Leaving Your Family’s Digital Safety in the Dust? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/rapid-tech-growth-leaving-familys-digital-safety-dust/feed/ 0
A Reflection on Mobile World Congress https://securingtomorrow.mcafee.com/consumer/reflection-mobile-world-congress/ https://securingtomorrow.mcafee.com/consumer/reflection-mobile-world-congress/#respond Mon, 13 Mar 2017 09:49:12 +0000 https://securingtomorrow.mcafee.com/?p=70359 This blog post was written by Nick Viney. As the dust settles on another busy year at Mobile World Congress, it’s important to reflect not just on the conference itself, but also the key takeaways for the security and consumer tech industry. MWC is seen by many as the key event for the mobile industry, […]

The post A Reflection on Mobile World Congress appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

As the dust settles on another busy year at Mobile World Congress, it’s important to reflect not just on the conference itself, but also the key takeaways for the security and consumer tech industry.

MWC is seen by many as the key event for the mobile industry, but one thing I realised this year is the show is moving way beyond being just about mobile. For me, and I’m sure others, it feels like the key focus is now connectivity. MWC has historically been the place where phone manufacturers got the chance to show off their latest handsets. This year however, it felt like the pendulum had swung and handsets were merely part of a much bigger ecosystem. We saw car manufacturers showcasing the latest developments in the connected car space, a host of IoT demos (including our very own Secure Home demo) right the way through to VR, which appeared to feature even more heavily this year than previous years. The proliferation of technology on show that wasn’t traditionally “mobile” was striking, but merely highlighted how fast technology is developing.

Another key theme was 5G. Looking at all the innovation being showcased across the show, the eagerness to get to a sustainable 5G network is obvious because of the connectivity benefits it provides. All these smart devices need a network to operate and the potential offered by 5G is incredibly exciting. However, there’s one more thing which connects all these devices and that’s the need for security. Connected devices are more integral to our lives than ever before and looking at the raft of exciting innovation on show at MWC, that’s only going to increase.

This year’s MWC has proven that innovation in the mobile space is far from slowing down. In fact, it’s adapting to changing trends instead. As security vendors, we need to adjust to ensure we’re staying one step ahead the curve. It’s no longer just the home and work computer that’s internet-connected. The onset of smart homes and connected cars mean we need to have the required security in place, and soon. The implications of increasing the number of connected devices creates potential risk to cyber-attacks much closer to home and as the smart home is only as secure as its weakest link, platforms like our own Secure Home platform will be critical moving forwards. Even everyday objects are being targeted by hackers, so as we move to a more autonomous connected future, it’s critical we’re able to provide the necessary protection for all.

It’s going to be an interesting road but one that we’re excited to go down. To stay on top of the latest consumer and mobile security threats, please do follow me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

The post A Reflection on Mobile World Congress appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/reflection-mobile-world-congress/feed/ 0
Window on a Cloudy Sky https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/window-cloudy-sky/ https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/window-cloudy-sky/#respond Tue, 07 Mar 2017 00:00:47 +0000 https://securingtomorrow.mcafee.com/?p=70188 This blog was written by Brian Dye. There’s no question that cloud services are now a regular component of IT operations. And while this is great news for business users and developers who appreciate the agility and increased productivity offered by cloud services, security professionals are getting nervous. Just about everyone in this line of […]

The post Window on a Cloudy Sky appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

There’s no question that cloud services are now a regular component of IT operations. And while this is great news for business users and developers who appreciate the agility and increased productivity offered by cloud services, security professionals are getting nervous.

Just about everyone in this line of work knows that all the excitement over adoption of cloud applications has spawned Shadow IT (the use of unsanctioned cloud services). However, most security teams lack the ability to discover what cloud services employees are using, what corporate data is being stored in the cloud, and who has access to the data. That’s a problem.

McAfee Security has begun to roll out our response to this issue: McAfee Cloud Visibility – Community Edition (CVCE). It is our first of two entries into the cloud access security broker (CASB) market. McAfee Cloud Visibility is a free service for existing customers with McAfee DLP, encryption or web protection technologies.

This solution comes at an important time. Cloud services are now utilized by more than 90% of organizations around the world. In fact, many are working under a “Cloud First” philosophy, only choosing to deploy an internal service if there is no suitable cloud variant available. As a result, IT architectures are rapidly shifting to a hybrid private/public cloud model, with those surveyed expecting 80% of their IT budget to be cloud-based within an average of 15 months.

We think McAfee Cloud Visibility is the answer to these issues — it enables security professionals to:

  • Discover authorized and unauthorized cloud applications used by employees.
  • Identify risk associated with cloud applications based on risk indicators.
  • Monitor sensitive data flowing between users and cloud applications.
  • Track endpoint health around threats, data leakage, and theft.

An added advantage is single-pane-of-glass manageability via McAfee ePolicy Orchestrator Cloud, which provides centralized monitoring of cloud applications and on-premises McAfee solutions, allowing for the synchronization of data protection events into one easy-to-use interface. That’s something no other CASB vendor can offer currently.

So, rather than fret about lack of cloud visibility or concern yourself with justifying the expense of a CASB solution, check out the McAfee Cloud Visibility—Community Edition solution at www.mcafee.com/cloudvisibility.

The post Window on a Cloudy Sky appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/window-cloudy-sky/feed/ 0
How To Prevent Ransomware (and Leprechauns) From Locking Up Your Data https://securingtomorrow.mcafee.com/business/prevent-ransomware-leprechauns-locking-data/ https://securingtomorrow.mcafee.com/business/prevent-ransomware-leprechauns-locking-data/#respond Mon, 06 Mar 2017 16:00:04 +0000 https://securingtomorrow.mcafee.com/?p=70162 St. Patrick’s Day is right around the corner, but before you crowd into your local pub and raise a green pint in honor of the Irish patron saint, keep an eye out for mischievous leprechauns… a.k.a: cybercriminals. No pot of gold is safe: including your company data. Leprechauns may be the stuff of folklore, but […]

The post How To Prevent Ransomware (and Leprechauns) From Locking Up Your Data appeared first on McAfee Blogs.

]]>
St. Patrick’s Day is right around the corner, but before you crowd into your local pub and raise a green pint in honor of the Irish patron saint, keep an eye out for mischievous leprechauns… a.k.a: cybercriminals. No pot of gold is safe: including your company data.

Leprechauns may be the stuff of folklore, but ransomware attacks are all too real. This style of cyberattack is steadily on the rise, growing by 128% year over year. And just like a pesky Leprechaun on St. Pat’s, this threat isn’t going away. Focus on how you can start preventing your company from becoming the threat’s latest victim:

Get to Know the Enemy

Ransomware is a form of malware that uses encryption to hold a victim’s data and files hostage. Once in control, the attackers force victims to hand over hefty ransoms to get their data back. Your company’s gold may be forever lost at the end of a distant rainbow.

Fortunately, there are steps every organization can take to mitigate the risk of attack, spot attempts to deliver ransomware early-on, and stop would-be attackers cold in their tracks. But before we examine the solution, let’s dive into the nature of an intrusion by following the dreaded “Ransomware Leprechaun.”

The Moment of Attack

Ransomware attacks often use zero-day malware to increase their chances of success. These are malware files ever so slightly different that they are unrecognized by signature-based security defenses. Like rainbows in the distance, these zero-day attacks guide our ransomware Leprechaun straight to your company’s most valuable assets – and no device is safe.

An attack often begins when a victim encounters a comprised website, advertisement, or url page element. Either using social engineering or simply waiting opportunistically for a visitor, cybercriminals lure the victim into visiting the pages where they become infected. More sophisticated attackers will even exploit a victim’s locale and/or favorite web services (i.e. a local government user visiting a Chamber of Commerce site) in a targeted attack. Once a person has been infected by ransomware, the malware can immediately begin to lock files and data across networks and devices. By the time you can react, the leprechaun-like cybercriminal is already inside.

Prevention and Protection

It’s never too early to start focusing on how you can prevent your company from becoming ransomware’s next victim. Adopt first-class security solutions to protect your company and data, such as McAfee Web Gateway, which deploys a multi-layered defense strategy that actively and automatically identifies zero-day attacks and stops them before any damage is done. Here’s how it works:

First, web gateway technology acts as the front line of defense by assessing the reputation of incoming urls, automatically blocking known infected elements.

Then in its next layer, machine learning intelligence identifies the attributes of ransomware through a process we call Behavioral Emulation. Because ransomware attacks continue to grow in complexity via code-changes and the discovery of new zero-day vulnerabilities, a truly secure defense system requires agility and must be able to recognize malignant code organically, without the need of human intervention.

Rather than looking for known file signatures, Behavioral Emulation uses machine learning algorithms to look for suspicious behavior. Perhaps it is a snippet of JavaScript looking for an exploit in an unrelated program or an encrypted flash video calling out to an unknown server. Once these behaviors are identified, the web gateway flags them and diverts those suspicious elements before they reach the end-user. It’s like a ransomware “leprechaun net,” protecting everything, gold included, downstream.

Keep Your Company Safe, and Your Gold Safer

Ransomware attacks can happen at any time, to anyone. But the good news is you don’t have to rely on a leprechaun net to catch a cybercriminal from doing serious damage to your devices. Simply understand how ransomware paves a path for extortion and, more importantly, have the right solutions in place that are capable of warding off even the most creative, cutting-edge attacks.

To make sure that you guard your company, your employees, and your “gold” from these attacks, check out our overview on how to Defeat Ransomware.  Additionally, see how we’re collaborating with the industry and law enforcement to disrupt the business of ransomware cybercrime through the initiative at https://www.nomoreransom.org/.

 

The post How To Prevent Ransomware (and Leprechauns) From Locking Up Your Data appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/prevent-ransomware-leprechauns-locking-data/feed/ 0
Thoughts from the conference floor: securing the connected home https://securingtomorrow.mcafee.com/consumer/thoughts-conference-floor-securing-connected-home/ https://securingtomorrow.mcafee.com/consumer/thoughts-conference-floor-securing-connected-home/#respond Tue, 28 Feb 2017 15:46:33 +0000 https://securingtomorrow.mcafee.com/?p=69953 This blog post was written by Nick Viney. In my line of work, you read and hear a lot about the future of connectivity, but at Mobile World Congress the future feels so close you can almost touch it. Just one day in and already the place is abuzz with the latest tech, trends and […]

The post Thoughts from the conference floor: securing the connected home appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

In my line of work, you read and hear a lot about the future of connectivity, but at Mobile World Congress the future feels so close you can almost touch it. Just one day in and already the place is abuzz with the latest tech, trends and everything in between.

Last week, I wrote about what McAfee is doing to bring together the worlds of connectivity, computing, and cloud for a seamlessly connected, powerfully smart 5G future. And, just being here, you’re reminded why the task at hand is so important. As Dan Bieler, a Forrester blogger and analyst, noted last year, “The main MWC themes are increasingly intertwined.” He was talking about things from a business perspective, but the observation is still a valid one for the consumer world. The themes discussed at MWC reflect those going on in the wider world, where the future looks increasingly connected.

Just take a look at the home. Walking through the Fira Gran Via, I’m surrounded by technology which will soon be common-place in our everyday lives. Technology which will fill our living rooms, kitchens and bedrooms, promising to improve or enhance our day-to-day existence. Just take a look at the success of the Amazon Echo, which (based on my own social media channels) seemed to be under most people’s Christmas trees in December. And, as you might expect, Amazon is seeking to increase the usefulness of the Echo device and Alexa as time goes on, by partnering with other companies with an interest in reaching consumers at home.   

The connected home is no longer a far-off vision of the future, but a dawning reality. We’re using technology in our homes to join up services and devices which previously couldn’t be connected, and there’s plenty more on the horizon. As I’ve written about before, figures suggest that smart home products will exist in 50% of households by 2020 – and that’s something we should consider seriously.

Because, while technology offers a great many benefits, it also comes with its own inherent risks. In the same way that we worry about safeguarding our physical houses, we should also be concerned about security of our digital realms, and where the digital and physical meet.  

So by all means embrace the future, but remember these few simple steps as you do so:

  • Lock down your devices. Where possible, it’s important to ensure that devices are locked with a strong PIN code, as well as complex and unique passwords to prevent unauthorised access. The Smartphone is the gateway to a great many connected devices, so treat it with the same care and attention you’d give to your house keys. Use a multi-factor authentication (MFA) solution that will combine your strong passwords with an extra layer of security – like your fingerprint or facial recognition.
  • Keep your devices updated. Most devices will tell you when they need updating, so please don’t ignore them. Updates often include important security fixes designed to patch and protect from attacks.
  • Take control of your home network. Setting up a guest Wi-Fi network allows visitors to access the internet but keeps your home network private and isolated from their devices. You can also separate your IoT devices (smart home devices, wearables, etc.) from traditional connected devices (laptops, smartphones, tablets, etc.) where more secure information is stored, so if an IoT devices is compromised, the breach will be limited to devices connected to the guest network. Solutions, such as McAfee SecureHome Platform, help you easily manage and protect devices connected to both networks, and can ensure that guest devices connected to your network don’t (intentionally or not) open you up to an attack.

The post Thoughts from the conference floor: securing the connected home appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/thoughts-conference-floor-securing-connected-home/feed/ 0
Fake Font Update on Google Chrome Uses Social Engineering to Infect Users with Ransomware https://securingtomorrow.mcafee.com/business/fake-font-update-google-chrome-uses-social-engineering-infect-users-ransomware/ https://securingtomorrow.mcafee.com/business/fake-font-update-google-chrome-uses-social-engineering-infect-users-ransomware/#comments Fri, 24 Feb 2017 22:54:39 +0000 https://securingtomorrow.mcafee.com/?p=69851 We’ve seen social engineering attacks manipulate users time and time again. From phishing emails, to baiting attempts – this breed of cyberthreat has continued to manipulate users for years. And now a new scam has emerged that utilizes a fake update on Google Chrome to trick users into downloading and infecting themselves with the infamous Spora ransomware. […]

The post Fake Font Update on Google Chrome Uses Social Engineering to Infect Users with Ransomware appeared first on McAfee Blogs.

]]>
We’ve seen social engineering attacks manipulate users time and time again. From phishing emails, to baiting attempts – this breed of cyberthreat has continued to manipulate users for years. And now a new scam has emerged that utilizes a fake update on Google Chrome to trick users into downloading and infecting themselves with the infamous Spora ransomware.

The trick is simple. First, the attackers insert JavaScript into poorly secured, but legitimate websites to modify the text rendering on them. Then, when victims visit these sites, the script makes the website indecipherable and prompts them to fix the issue by updating their “Chrome font pack.” Essentially, a window pops up, showing, “The ‘HoeflerText’ font wasn’t found,” and users are asked to update the Chrome Font Pack. And if they click, they’re immediately infected with the highly-effective Spora ransomware, instead of an update for their browser.

So why is this attack seeing such easy success? Believe it not, Hoefler Text is, in fact, a real font, adding a sense of legitimacy behind the scam. However, the malware has primarily seen so much success due to its ability to fly under the radar, as it does not get flagged as an infection by a variety of security programs.

What’s worse is that this isn’t the first time this has happened – delivery of malware through the EITest redirect gates has been around since at least 2014. Additionally, the infected sites and samples change all the time and simply blocking URLs, domains, and IP’s at the perimeter would just be playing “whack-a-mole.”

In fact, EITest gates are typically used in combination with the RIG, Angler, and Sundown EK’s to redirect victims to quite a few ransomware strains, including Spora, CryptoShield, CryptoMix, and Cerber, as well as banking Trojans and various other malware types.

So, how do you protect yourself from this scam? You could change to a different browser other than Chrome but remember that the threat actors can adapt tomorrow and include Internet Explorer or Firefox.

Therefore, with this issue having the potential to persist in more ways than one, here’s a few tips for staying safe while you browse online:

• Keep your browser, AV, and third party plug-ins up to date. That way, if any suspicious or unknown updates come through, you’ll be able to identify them immediately as fake.

• Keep your operating system patched. Software vendors fix flaws as quickly as they can, so make sure to apply all patches as soon as they become available.

• Stay educated. When you’re on a website, it’s a huge red flag if a pop-up appears asking to install or upgrade fonts, media players, pdf readers, etc. So, take some time to study up on browser norms so that if a website ever requires additional software to display whatever your looking at, you can identify the scam right then and there.

 

The post Fake Font Update on Google Chrome Uses Social Engineering to Infect Users with Ransomware appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/fake-font-update-google-chrome-uses-social-engineering-infect-users-ransomware/feed/ 1
A look ahead to Mobile World Congress 2017 https://securingtomorrow.mcafee.com/consumer/mobile-and-iot-security/look-ahead-mobile-world-congress-2017/ https://securingtomorrow.mcafee.com/consumer/mobile-and-iot-security/look-ahead-mobile-world-congress-2017/#respond Tue, 21 Feb 2017 18:12:28 +0000 https://securingtomorrow.mcafee.com/?p=69616 This blog post was written by Nick Viney. It’s nearly that time of year again! Next week, Mobile World Congress will get underway in Barcelona, Spain, and as usual there are a few hot topics which will dominate chatter in the Fira Gran Via. After last years’ conference, I wrote about some of our plans […]

The post A look ahead to Mobile World Congress 2017 appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

It’s nearly that time of year again!

Next week, Mobile World Congress will get underway in Barcelona, Spain, and as usual there are a few hot topics which will dominate chatter in the Fira Gran Via.

After last years’ conference, I wrote about some of our plans for 5G, including the birth of a “network revolution” that will allow the growing number of connected devices to reach their full potential.

Well, it’ll come as no surprise to anyone that 5G will be a big topic again this year, as we start to address the potential security issues that may come with a hyper-connected future.

So where are we now?

It’s clear the connected world will soon outstrip the limited focus of just desktops and mobile, and in many ways it already has, even before the arrival of 5G. According to recent figures, smart home products will exist in 50% of households by 2020, while IDC predicts that worldwide wearable shipments will reach 213.6 million in the same year.

Clearly, much of this will start at home, and we know that any weak link in a connected home could put consumers, their devices and ultimately their data, at risk. In the last year, we’ve seen some of the worst vulnerabilities in IOT connected devices, and if consumers can’t trust technology, they simply won’t use it. Security makes that kind of trust possible, and so safeguarding those devices — as well as the infrastructure they rely on — is paramount.

Over the next couple of weeks, we’ll be talking about how McAfee is planning to help secure the future ahead of 5G, and ensure that our hyper-connected lives are safe, secure and private.

So, whether you’re heading to Barcelona or simply following the news from home, stay tuned for more announcements next week!

The post A look ahead to Mobile World Congress 2017 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/mobile-and-iot-security/look-ahead-mobile-world-congress-2017/feed/ 0
Oversharing: Passwords, but not Toothbrushes!? https://securingtomorrow.mcafee.com/business/oversharing-passwords-not-toothbrushes/ https://securingtomorrow.mcafee.com/business/oversharing-passwords-not-toothbrushes/#respond Wed, 15 Feb 2017 22:13:34 +0000 https://securingtomorrow.mcafee.com/?p=69283 Potentially significant security risks from your employees’ significant others What would you be more likely to share with your partner? Your toothbrush? Or your work password? Only about 10% of people polled are willing to share their toothbrush, but twice as many are willing to share their work password! People share a lot with their […]

The post Oversharing: Passwords, but not Toothbrushes!? appeared first on McAfee Blogs.

]]>
Potentially significant security risks from your employees’ significant others

What would you be more likely to share with your partner? Your toothbrush? Or your work password? Only about 10% of people polled are willing to share their toothbrush, but twice as many are willing to share their work password!

People share a lot with their significant other, most of which makes for healthy relationships. However, there is a point of oversharing, especially when it comes to the security and privacy of your workplace. Analyzing data from a recent study by McAfee, we found that people are not only surprisingly willing to share their workplace information with their partner, but that in too many cases, this resulted in some potentially serious consequences.

First, let’s take a look at the major sharing questions:

  • 21% of respondents do or would share their work passwords with their significant other
  • 34% would allow their significant other to use their work device
  • 33% might let their significant other use their work device, depending on the situation

There is a lot of sharing happening at home, beyond dinner table conversations. You might think that this is all relatively harmless, and no worse than the discussions that happen between partners in response to “how was your day?”. But when we examined the consequences of sharing a work device, the results were quite significant.

The most likely effect of sharing a work device is that your employee’s partner got a look at a confidential email. This happened 14% of the time, and most of the partners respected the confidentiality. However, 2% of the time, the confidential info was repeated to someone else. For example, for an organization with 25,000 employees, that represents 3,500 potential leaks, and 500 actual leaks of confidential info!

The next most likely consequence is an email being accidentally deleted, which happened 11% of the time. This one is probably recoverable by most email systems, as long as the partner quickly discloses their mistake, but it still represents 2,750 deleted emails for our example organization. A further 9% accidentally responded to a colleague, 8% accidentally responded to a client, and 5% accepted or altered a calendar invitation. These are potentially more serious consequences to try and recover from than simply restoring a deleted email.

Finally, 7% opened an email that had malware on it, which infected the device, and a further 5% accidentally locked the device with too many failed password attempts. For our example organization, this means 1,750 infected devices that need to be cleaned, and 1,250 devices that need to be unlocked.

These examples help demonstrate the importance of continuing security education and awareness training for your employees. Since providing security training for your employees’ families is outside your scope, strongly consider  implementing additional security measures like multi-factor authentication or biometrics on hardware devices and software applications that are located outside the corporate network. Adding another layer of protection goes one step further to ensuring things don’t happen beyond your control, and maybe comparing work devices to toothbrushes will discourage oversharing!

 

 

The post Oversharing: Passwords, but not Toothbrushes!? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/oversharing-passwords-not-toothbrushes/feed/ 0
RSA 2017: Can’t Miss Events https://securingtomorrow.mcafee.com/business/rsa-2017-cant-miss-events/ https://securingtomorrow.mcafee.com/business/rsa-2017-cant-miss-events/#respond Tue, 07 Feb 2017 19:56:06 +0000 https://securingtomorrow.mcafee.com/?p=68921 Let the countdown begin: RSA is almost here! The RSA conference in San Francisco is only a week away, and this year the theme is “Power of Opportunity,” inspired by the zen teaching to “pursue even the most advanced study with the mindset of a beginner.” We’re officially inspired (and excited). Whether you’re a RSA […]

The post RSA 2017: Can’t Miss Events appeared first on McAfee Blogs.

]]>
Let the countdown begin: RSA is almost here!

The RSA conference in San Francisco is only a week away, and this year the theme is “Power of Opportunity,” inspired by the zen teaching to “pursue even the most advanced study with the mindset of a beginner.” We’re officially inspired (and excited).

Whether you’re a RSA veteran or newcomer, there’s a path (and party) for you.

Join us at the world’s leading forum for enterprise and technical information security professionals, and choose a topic/track based on what you want to get out of this year’s conference: is it hands-on sessions and keynotes with the best and brightest in cybersecurity, or is the expo hall more your speed? Take a look at the events we’re most excited about, below.

Hope to see you at RSA!

Keynotes: 

Our Senior Vice President and General Manager, Chris Young, will be presenting his fourth RSA keynote “Sweating the Small Stuff on a Global Scale.” Chris will explain the importance of balancing the macro view with the micro details in cybersecurity. Since his last keynote, Chris was appointed by President Barak Obama to the National Security Telecommunications Advisory Council. You won’t want to miss Chris as he takes the stage on February 14th, at 9am in Moscone West, Level 3.

Sessions:

#NoMoreRansom with Christiaan Beek & Raj Samani

On February 13th, Christiaan Beek and Raj Samani of McAfee will be once again joining forces in their session, “#NoMoreRansom: Industry and Law Enforcement Join Forces to Fight Back.” This session is a part of the Ransomware Summit, a day filled with discussion on ransomware research and case studies on response and recovery. Reserve your seat now before it’s too late.

Patty Hatter and the State of Cybersecurity

Patty Hatter, VP and General Manager of Professional Services will also be presenting at this year’s conference. Her session, “How Leaders of Tomorrow Attack Security Problems Holistically and Head On” is on February 14th, at 2:30pm at Moscone North Room 131. In her classroom presentation, Patty will examine the state of cybersecurity within today’s enterprises and offer her recommendations to IT leadership on how to address problems head on with transparency and teamwork. Reserve your seat now.

Expo Hall:

Be sure to stop by our booth #N3801 in the Expo North Hall— it’s going to be awesome (and you’ll have a chance to win some prizes)! Meet with our experts and sit in on theatre presentations or get hands-on experience at one of our 9 demo stations. It is an exciting time for McAfee, especially when it comes to cloud. On Monday, stop by the Cloud Security Alliance Summit at the Marriott Marquis hotel for a day filled with cloud focused sessions and panels. We’ll have a photo caption contest happening at the booth with some great prizes including an Amazon Echo and Star Wars Drone. Leave the booth with more knowledge and maybe even some swag.

Are you as excited for RSA as we are? You can find more information and register for the conference here.

 

The post RSA 2017: Can’t Miss Events appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/rsa-2017-cant-miss-events/feed/ 0
The Security Advantage of Dynamic Endpoint https://securingtomorrow.mcafee.com/business/security-advantage-dynamic-endpoint/ https://securingtomorrow.mcafee.com/business/security-advantage-dynamic-endpoint/#comments Tue, 07 Feb 2017 00:27:09 +0000 https://securingtomorrow.mcafee.com/?p=68850 This blog was written by Brian Dye. The escalation and sophistication of cyber threats is very real. So are the challenges associated with having too many siloed security tools. Rather than compounding complexity and inefficiency by using products that don’t work in unison or communicate with each other, McAfee made a fundamental shift in how […]

The post The Security Advantage of Dynamic Endpoint appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

The escalation and sophistication of cyber threats is very real. So are the challenges associated with having too many siloed security tools. Rather than compounding complexity and inefficiency by using products that don’t work in unison or communicate with each other, McAfee made a fundamental shift in how we engineer solutions, moving from point products to integrated systems that deliver better security outcomes.

Protect, detect and correct are better together

As Candace Worley suggested in her blog last fall, some things are simply better together! Integrating the threat defense builds the best protection possible, finds and contains advanced threats, and rapidly remediates them, while adapting to do a better job blocking the next threats. Quite simply, organizations with integrated security are 30%1 better protected.

Automating the Threat Defense Lifecycle helps eliminate routine tasks, enables faster new hire onboarding, and frees your strongest talent to tackle your hardest problems.

At the endpoint, McAfee provides this advantage through our new solution – Dynamic Endpoint Threat Defense. This multi-stage solution outsmarts even the savviest cyber threats and emerging malware, including ransomware. By leveraging the cloud dynamically to drive threat detection and analysis, and automating the Threat Defense Lifecycle, it shortens the window of vulnerability and makes it easier for endpoint administrators to focus on critical tasks.

Integrated, multi-stage protection improves efficacy

Not only is Dynamic Endpoint the only solution built on a connected platform, it’s also unique in the way it provides pre- and post-execution analysis powered by proven machine learning (Real Protect), greyware containment (Dynamic Application Containment) and native endpoint detection response (Active Response). This solution uniquely addresses the entire Threat Defense Lifecycle with a single agent and console. It allows multi-stage protection to share insight as it stops malware across each stage:

  • Before it reaches the endpoint
  • Before it executes
  • While it executes
  • After it executes

McAfee Labs tested ENS 10.5, with Real Protect, vs ENS 10.2, and demonstrated a 34% higher detection rate. Most importantly, our tests confirmed its ability to stop zero-day malware, like ransomware, and secure the endpoint BEFORE the threat can infect the host. The advantage is further illustrated by private third-party real world testing conducted by AVTest showing perfect efficacy scores in 3 consecutive rounds.

Beyond the initial test results, customers are also sharing their enthusiasm for the new solution.

Not only does ENS handle the ‘commodity’ threats that can significantly occupy team resources, it now gives us even stronger advanced threat detection, protection and visibility.” – Large Manufacturer

ENS 10.2 has had the fastest endpoint adoption in history

Even simple upgrades are no small task for large organizations. However, since the release of Endpoint Security (ENS) 10.2 in August 2016, we have seen more than 2.5 million nodes already migrated, including a full 100K+ node environment. This rapid adoption represents the fastest adopted endpoint release in McAfee’s history. With over 80% of our installed base already on ENS-ready ePO versions, and more than half engaged in planning and deployment, we anticipate the adoption record being shattered during 2017.

For those interested in migrating to ENS 10.2 or 10.5, we’ve created a migration assistant to educate and aid customers while they migrate their data to the new platform. Automatic migration can create new policies and client tasks based on your current product settings and automatically assign them to groups and managed systems. For more information on migrating, visit www.mcafee.com/movetoens.

Native EDR closes the window of vulnerability

Built on the same connected architecture, using the same agent, and same ePO management console, Dynamic Endpoint includes endpoint detection and response (EDR) capabilities. Instantly, you have all the information necessary to detect, convict and remediate a threat in seconds rather than days or weeks. Using one-click actions, it’s possible to delete a malicious file from a single endpoint or across the entire organization; or, immediately update protection across all connected components based on the insight from the investigation.

Active Response 2.0 definitely saves time. The modern workspace makes remediation much faster. Specifically, the speed to search, gather information on a threat and take action is done in mere minutes.” – Large Bank

Dynamic Endpoint breaks security silos to create a closed-loop system

Unlike other security vendors, McAfee provides a connected platform with integrated tools delivering better protection while preserving the most valuable resource – time. Our Dynamic Endpoint integrates with other McAfee products as well as third-party products through DXL, the industry’s leading (now open source!) threat sharing infrastructure. This allows users to automatically adapt defenses to stay ahead of emerging threats, using a connected infrastructure prepared for the future, rather than merely layering components.

Dynamic Endpoint Threat Defense is an integral part of McAfee’s core strategy, which was introduced at FOCUS ’16. Just as I emphasized in the Automating the Threat Lifecycle blog last year, we are committed to using integration, automation and orchestration to help users address more threats, faster, with fewer resources. Join us, and see for yourself!

1Penn Schoen Berland. Research on behalf of McAfee, 2016

 

Brian Dye is Corporate Vice President and General Manager of Corporate Products at McAfee.

The post The Security Advantage of Dynamic Endpoint appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/security-advantage-dynamic-endpoint/feed/ 2
McAfee Displacement Products Create a Trip of a Lifetime https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/#respond Mon, 30 Jan 2017 22:20:53 +0000 https://securingtomorrow.mcafee.com/?p=68621 This blog was written by Richard Steranka. In the second half of 2016, we challenged our Platinum and Gold partners to Challenge the Competition with a global partner incentive focused on competitive displacement. Cash prizes were awarded monthly for deal registrations, demos and proof of concepts (POCs). Eight grand prizes were awarded for a trip […]

The post McAfee Displacement Products Create a Trip of a Lifetime appeared first on McAfee Blogs.

]]>
This blog was written by Richard Steranka.

In the second half of 2016, we challenged our Platinum and Gold partners to Challenge the Competition with a global partner incentive focused on competitive displacement. Cash prizes were awarded monthly for deal registrations, demos and proof of concepts (POCs). Eight grand prizes were awarded for a trip of a lifetime!

Key Displacement McAfee Products One of the leading competitive displacement products in 2016 was the McAfee Endpoint Security platform. This unique platform provides a collaborative security framework that reduces the complexity of endpoint security environments, provides better performance to protect productivity and visibility into advanced threats, and speeds detection and remediation response. Real-time communication between threat defenses enables the sharing of events so IT can take action against potentially dangerous applications, downloads, websites, and files as suspicious behaviors are observed.

Challenge The Competition Again! In 2016, Platinum and Gold Partner sales representatives and sales engineers were the big winners from each region. The Trip of a Lifetime Grand Prize went to the salesperson with the largest booking within the incentive timeline. Sales engineers were selected in a random drawing for each approved demo and POC within the incentive timeline.

This popular competition runs through 2017. The Trip of A Lifetime prize package for two will be awarded in June and December with additional cash prizes for ENS 10.5 migrations, technical checks completed by sales engineers, and awards for MSP deals. Check out the 2017 Challenge the Competition Global Partner Incentive Program for details.

Sales Reps and Sales Engineers Win A Trip of A Lifetime

For sales reps, the North America Trip of A Lifetime winner is Norman Huszar from Digitalera Group LLC. In Latin America, the grand prize goes to Ester Vazquez Campos from Information Security Services United Inc. Sudarsan Ranganathan from Veeras Infotek is the grand prize winner for APAC, and the winner from EMEA is Marcin Filipczak from STiNET.

For sales engineers, the Trip of A Lifetime goes to Paul Kaplan of CipherTechs in North America, Carlos Coronel from Consulting Group Corporacion LatinoAmericana S.S. in Latin America, Shabeer Shiyam from South Asian Technologies Pvt Ltd. In APAC, and Eric Bruseker from Comparex B.V. in EMEA.

Erik Bruseker of Comparex said, “McAfee has been a strategic partner for years. The vision and implementation of an integrated and collaborative security platform speaks to our customers and aligns with the security value proposition of Comparex. This award is a confirmation that we are on the right track with McAfee.”

Each winner receives a unique Trip of A Lifetime for two guests, a choice of fantastic destinations around the globe, accommodations at a Four Seasons property, and many other ingredients to truly make a trip of a lifetime. We hope to see many more of our partner reps and SEs “Challenge the Competition” again with us. 2017 will be an exciting year for McAfee and our partners.

The post McAfee Displacement Products Create a Trip of a Lifetime appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/mcafee-displacement-products-create-a-trip-of-a-lifetime/feed/ 0
You’ve Shipped that Life-Saving Medical Device. Now What? https://securingtomorrow.mcafee.com/business/medical-device-security-2017/ https://securingtomorrow.mcafee.com/business/medical-device-security-2017/#respond Wed, 11 Jan 2017 15:27:14 +0000 https://securingtomorrow.mcafee.com/?p=67801 We appropriately put a great deal of emphasis on security-by-design and incorporating the right technologies in IoT devices and systems to protect them. But as the threat landscape evolves, devices end up being used in new ways over the course of their lives. This is especially true in the rapidly evolving use of connected, intelligent […]

The post You’ve Shipped that Life-Saving Medical Device. Now What? appeared first on McAfee Blogs.

]]>
We appropriately put a great deal of emphasis on security-by-design and incorporating the right technologies in IoT devices and systems to protect them. But as the threat landscape evolves, devices end up being used in new ways over the course of their lives. This is especially true in the rapidly evolving use of connected, intelligent tools in healthcare, and is particularly critical to address given the life-threatening possibilities if medical equipment is compromised. In response, the U.S. Food and Drug Administration has released very thoughtful guidance on security for medical devices that are in market.

The medical device industry has a very strong safety culture which has extended into cybersecurity as software-content and connectivity have increased. One can see the result of this discipline in the FDA document which is inclusive of compensating controls – i.e., practices that may be implemented in the environment such as removing a device from the network – that can correct for a vulnerability while it is being addressed. The document also lays out many scenarios to illustrate remediation and reporting requirements.  Additionally, it also refers to the NIST “Framework for Improving Critical Infrastructure Cybersecurity” guidance which was created with significant stakeholder participation.

The heart of the recommendations center on three areas that we know from other industries are critical to providing strong security throughout the lifecycle:

  1. Engagement with researchers – medical device security is an area of significant research activity with vulnerabilities publicized on everything from pacemakers to insulin pumps. Manufacturers need to have a process defined to report those vulnerabilities, and reports should be acknowledged and addressed.
  2. Information sharing on threats and vulnerabilities. Participation in an Information Sharing Analysis Organization (ISAO) such as the National Health Information Sharing & Analysis Center (NH-ISAC) is highly encouraged for collaboration amongst all the stakeholders who share responsibility for Health IT infrastructure.
  3. Mechanisms for providing software updates and patching with FDA guidance on compensating controls.

As a companion document to the premarket guidance the FDA provided in October 2014, this new document stressing security throughout the life of medical devices is actionable and provides a roadmap  for other industries.

The post You’ve Shipped that Life-Saving Medical Device. Now What? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/medical-device-security-2017/feed/ 0
7 Ways to Clean Up Those Sloppy Digital Habits in 2017 https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/7-ways-clean-sloppy-digital-habits-2017/ https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/7-ways-clean-sloppy-digital-habits-2017/#respond Thu, 29 Dec 2016 07:43:37 +0000 https://securingtomorrow.mcafee.com/?p=67501 You’ve been fortunate over the years — no lost phone, no credit card fraud, no computer viruses. Still, deep down, you fear your sloppy digital habits will eventually catch up with you. So, instead of dread and denial, how about a little peace of mind? It’s a new year and the perfect time to take […]

The post 7 Ways to Clean Up Those Sloppy Digital Habits in 2017 appeared first on McAfee Blogs.

]]>
You’ve been fortunate over the years — no lost phone, no credit card fraud, no computer viruses. Still, deep down, you fear your sloppy digital habits will eventually catch up with you. So, instead of dread and denial, how about a little peace of mind? It’s a new year and the perfect time to take a few easy steps and make 2017 your most unhackable, cyber-savvy year ever.

7 easy ways to tighten up your digital habits:

  1. Two-factor authentication. This small action sounds like a big deal but it’s easy and it’s important. Two-factor authentication is simply putting two layers of security on any personal information channels you frequent. Be it your phone, Facebook, your email, or your bank account, taking the extra time to implement a two-step password entry, will mean potential crooks will get frustrated and move on to someone else’s information. Take this step: Go into the account settings of any important account and manually opt for a two-factor authentication account entry.
  2. Steer clear of public wifi. It’s convent and fun to work from the local coffee shop. However, it only takes one nosey, unethical person at that location to access your computer through that shared public network. Snoopers can easily access your passwords, emails, and anything else on your computer. Do your sensitive work at home or in the office on a secure, password-protected network and save your non-wifi workload such as report reading or writing (sans wifi) for the coffee shop. Avoid doing any banking or private work on public wifi, especially. Tip: Look in the search bar where the URL comes up. If you see an “s” in the website address, i.e., “https” at the front of the address, that website is safe and encrypted, which means your data can’t be read in transmission. If you only see “http,” that site isn’t secure. So do not proceed. Take this step: If you are working on public wifi, go to your security settings and enable your firewall, which will help block out all incoming traffic and keep potential criminals out.
  3. Don’t be lazy with passwords. The most common mistake consumers make, according to McAfee’s Digital Asset Study, is using the same password for all or most online accounts. If this is you, break this poor habit once and for all in 2017. Take this step:  Take an hour out of your day and change and document all of your passwords for 2017. Once you’ve beefed up your passwords, you can simplify the password process by using True Key multi-factor authentication service for free.

A strong password has all of the following characteristics:

  • Is at least ten characters in length
  • Doesn’t contain any word or words found in the dictionary
  • Mixes capital and lower-case letters
  • It Contains special characters like numbers, punctuation marks, or symbols.

4. Declutter your devices. Simplify, simplify, simplify your new year and your safety will improve immediately. With so many digital assets flying at us each day — email, images, files, documents, attachments — it’s easy to get overwhelmed. And, when we are overwhelmed, it’s easy to get sloppy in the places that matter most — like privacy. So, kick off the new year by decluttering your devices so you can focus on safety.

To organize:

a) Phone: Purge unused apps on your phone and desktop

b) Phone: Organize your apps into folders on your home screen. Here’s how to do it on your Android or iPhone.

c) Laptop, iPad, tablet: Organize your desktop files into folders and organize your folders by years, i.e., 2014, 2015, 2016. If you have old files either purge them or archive them in a folder or hard drive that doesn’t visually clutter your desktop.

d) Laptop: Clean up your email. This is a very good time to purge old emails, build folders, review and file flagged files, and delete old emails with big attachments that may be using memory on your computer. Need to purge all the spam in your inbox? Unroll.me is a free, fast, easy way to do just that.

e) Laptop: Delete unused email accounts, paid subscriptions, and you no longer use.

5. Target your software. While you work, sleep, and play, hackers are working nonstop to try to break into your computer with spyware, malware, and viruses. If you’ve never considered anti-virus software, consider it in 2017. Also, to beef up social media safety, this is the year to invest in filtering software for your entire family.

6. Stop sharing so much. Want to get serious about privacy in 2017? Make this the year you refrain from so much social sharing. Pull back, rethink, zip it. Hackers often use fake social media accounts to monitor your data. A determined identity thief on Facebook can discover information about your life, use it to answer security questions on your accounts, and access to your financial information. Consider trimming down your Facebook, Twitter, Instagram, and SnapChat friends to a small group of people you actually know and trust. High follower numbers are not worth the fallout of getting hacked. Remind your entire family: Never post your full name, Social Security number, address, phone number, or account numbers on public sites.

7. Don’t blow off critical updates. Yes, updates can be a pain if you are in the middle of a workday. However, updating software is essential to a secure digital life. If you use popular software such as Adobe Flash, Adobe Shockwave, Adobe Acrobat Reader, Java, or browsers like Chrome, or Internet Explorer, make sure you have the latest version available installed. Cyber criminals keep an eye on these apps and try to find security holes so they can infect devices with spy and malware.

The new year means a new start. Most of these suggestions take 15 minutes or less but can make a huge difference. So here’s to a strong digital start to a fantastic new year for you and your family.

Toni Birdsong is a Family Safety Evangelist to McAfee. You can find her on Twitter @McAfee_Family and @ToniBirdsong. (Disclosures).

The post 7 Ways to Clean Up Those Sloppy Digital Habits in 2017 appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/trusted-advisor/7-ways-clean-sloppy-digital-habits-2017/feed/ 0
Cloud Services: Build or Buy? https://securingtomorrow.mcafee.com/business/cloud-security/cloud-services-build-buy/ https://securingtomorrow.mcafee.com/business/cloud-security/cloud-services-build-buy/#respond Tue, 06 Dec 2016 16:54:20 +0000 https://securingtomorrow.mcafee.com/?p=68660 Cloud computing is here to stay. Like it or not. But how does a cloud computing user know if the system is safe to store and process vital business and personal data? How do cloud service providers build the necessary trust, manage risk, and protect vital data in cloud systems? You need the flexibility, scalability, […]

The post Cloud Services: Build or Buy? appeared first on McAfee Blogs.

]]>
Cloud computing is here to stay. Like it or not. But how does a cloud computing user know if the system is safe to store and process vital business and personal data? How do cloud service providers build the necessary trust, manage risk, and protect vital data in cloud systems?

You need the flexibility, scalability, and potential cost savings that cloud services deliver. But should you build your own, or buy your services? The answer is heavily dependent on your organization’s capabilities, resources, and capital and/or operational budgets. Both approaches require a comprehensive risk assessment and a business resumption plan. However, what happens in between is very different.

Building a private cloud

If you are going to build a private cloud, you first need to know your capabilities and risk tolerance. This is a detailed assessment that covers the people, processes, and technology that comprise the cloud service, and potential consequences or risks should certain security controls fail or something else goes wrong.

A risk assessment does not comprise statements like “the risk is medium.” What are decision makers to do with such a vague statement? It is essential to measure and quantify risks. If you cannot express the loss expectancy and the probability of that loss, you do not fully understand the risk. It is not easy, and it requires experienced personnel that can clearly and concisely articulate the risks to the appropriate decision makers.

To properly manage risk, a risk management framework is needed and it must be continually monitored and assessed for inertia, institutional bias, incorrect or outdated assumptions, etc.[1] There are well-established security and risk management frameworks to choose from, such as ISO 27001 or SOC.

These are less prescriptive than some sector-specific frameworks like FedRAMP, which is geared specifically for U.S. government customers. However, FedRAMP has its merits too in the private sector as it is based on several NIST standards like NIST SP 800-53. These frameworks tend to apply to specific markets and operating models, but there is little reason not to go with at least one of these for your risk management activities. They provide reasonable baseline requirements for security controls of a cloud service and operation.

The next steps are implementation and operation. Once you have identified the appropriate security controls, you need to implement them across the service organization. This requires investing in people with the necessary skills and expertise, which may be the biggest challenge. Some countries, regions, and industries are experiencing acute shortages of skilled security personnel.

If you have overcome this issue, then the team needs to review and redesign business processes to ensure that the security controls are implemented correctly and routinely maintained. Simply applying new security controls to existing processes can result in large inefficiencies, gaps in coverage that can eventually lead to service outages, or worse, a breach.

Finally, once your private cloud is operating, you need to continuously monitor and test the systems and controls against a changing set of regulations, standards, technology, applications, threat landscape, and vulnerabilities. Not doing this on a continual basis leaves the organization vulnerable to advanced emerging threats, leaks from new data or applications, or other unanticipated changes to the environment.

Buying public cloud services

If you are going to buy public cloud services, the first step is to understand the service and service provider. You need to ask and verify that the service provider has adequate security and privacy controls and has implemented some sort of formal risk management framework that is in your best interest. What frameworks have they implemented? Do they have any third-party certifications? Do they continually monitor and test their security controls? How do they resolve security issues and in what timeframe?  Essentially, you are looking for formal attestation or third-party verification of their security controls and that they are doing the right things.

The next step is to look at the contract terms and conditions. Service-level agreements (SLAs) are important contract clauses that warrant special attention. It is important to choose or negotiate the minimum level that meets your needs, so that you are not paying for service levels beyond your requirements. You also need to verify that you are receiving the necessary service level, and be clear on the penalties and remedies available should the service provider not meet its obligations.

Once you have chosen your provider, you need to audit routinely. Situations change, regulations change, and certifications expire. If you are not auditing routinely to verify that the provider’s operations are still delivering the required and stated security controls that meet your risk tolerance, then you are doing yourself a disservice.

Business resumption

Finally, things can and do go wrong. Regardless of whether you build or buy, you need business resumption plans that cover a wide range of scenarios. Whether it is catastrophic failure of a data center, bankruptcy of a cloud provider, merger or acquisition, or a data breach, you need to be prepared so that you can respond immediately and appropriately, and keep your business operating. Business resumption plans also need to be routinely tested and adapted to evolve with your business.

[1] Steve Grobman and Allison Cerra, The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War (New York: Apress Media, 2016).

The post Cloud Services: Build or Buy? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/cloud-security/cloud-services-build-buy/feed/ 0
Big, Hard-to-Solve Problems https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/big-hard-solve-problems/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/big-hard-solve-problems/#respond Tue, 29 Nov 2016 11:55:48 +0000 https://securingtomorrow.mcafee.com/?p=66670 Improving the Lifecycle of Threat Defense Effectiveness When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better with real-world scenarios and user feedback. Eventually, the bad guys realize that this new thing is causing them real problems, so they start looking for ways over, […]

The post Big, Hard-to-Solve Problems appeared first on McAfee Blogs.

]]>
Improving the Lifecycle of Threat Defense Effectiveness

When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better with real-world scenarios and user feedback. Eventually, the bad guys realize that this new thing is causing them real problems, so they start looking for ways over, around, or through it. They conduct experiments, find vulnerabilities, develop evasion techniques and exploits, and the new thing’s effectiveness gradually declines.

Talking with McAfee thought leaders, we developed a list of hard-to-solve problems that together shorten the threat defense effectiveness lifecycle. When we fix these problems, we will lengthen the lifecycle. The hard-to-solve problems, along with early industry efforts to fix them, are detailed in the McAfee Labs 2017 Threat Predictions report. These problems cannot be solved with a patch or a new security tool. They need foundational research, lots of development, and a collaborative effort throughout the security industry.

Information asymmetry

Unlike during many conflicts, cybercriminals have far more information about our security techniques and defenses than we have about their attacks. They can test against security products and real-world defenses without consequences, and we cannot see most of what they are doing. If we share more information with each other about what we learn, we can build more complete attack pictures, identify potential weaknesses in our technologies, and work quickly to adapt and improve. Because money is the prime motivator for most attacks, anything we can do to make attacks less profitable, increase the likelihood of consequences, and support law enforcement activities will help.

Insufficient visibility

Attacks are often not discovered until long after data has been stolen. Shadow IT, multiple cloud types, personal devices, and the disappearing network perimeter have made it more difficult for security operations to know what is where. As a result, the trend is away from absolute protection and toward informed risk management. Tools that identify and classify data, monitor its movement, and encrypt it or block its path are needed to identify and modify risky behavior, and build a clearer risk profile.

Exploitation of legitimacy

For all the talk of sophisticated hackers and complex exploits, legitimate credentials stolen through phishing and other social engineering attacks that target human vulnerabilities is the tool of choice for many cybercriminals. Telling the difference between valid and suspicious activity on a legitimate account is very difficult. Behavioral analysis to detect suspicious activity is a good start, but we need to move to a transactional model that evaluates the potential intent of individual actions and data movements. One possibility is the addition of user reputation information to behavioral analysis. This is a very delicate issue that might involve attributes such as job role, tendency to reuse passwords, typical working hours and locations, and even details from HR databases to determine whether a suspicious action is malicious.

Agentless protection

Finally, new device types with little memory or computing capacity, a proliferation of limited-scope operating systems, and devices that cannot be updated are moving security away from the traditional agent-based approach to protection. Chips will need enhanced hardware-level security and trusted execution environments, supported by elastic cloud-based behavioral analysis and threat processing, and informed by large networks of shared threat intelligence.

Cybersecurity has some pretty big problems, but collaborative efforts between security vendors, law enforcement organizations, and affected companies will help lengthen the threat defense effectiveness lifecycle.

To read the full details about these and other hard-to-solve problems and early efforts by the security industry to resolve them, download the McAfee Labs 2017 Threats Predictions report.

 

The post Big, Hard-to-Solve Problems appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/big-hard-solve-problems/feed/ 0
Welcome to the Wild West, Again! https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/welcome-wild-west/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/welcome-wild-west/#respond Tue, 29 Nov 2016 05:01:10 +0000 https://securingtomorrow.mcafee.com/?p=66592 Threats, Regulations, and Vendor Responses to Risks in the Internet of Things The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again as a metaphor for the Internet of Things (IoT). Driven by similar issues of exploration, homesteading, and prospecting for riches, IoT devices are becoming […]

The post Welcome to the Wild West, Again! appeared first on McAfee Blogs.

]]>
Threats, Regulations, and Vendor Responses to Risks in the Internet of Things

The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again as a metaphor for the Internet of Things (IoT). Driven by similar issues of exploration, homesteading, and prospecting for riches, IoT devices are becoming as common as the bison that once roamed these lands. Hundreds of thousands of device types, organized into vast networks that will generate an immeasurable amount of data, are being incorporated into almost every industry and proposed for every type of consumer activity.

We discussed the future of IoT threats, regulations, and likely vendor responses with experts throughout the company, and distilled their thoughts in the McAfee Labs 2017 Threat Predictions report. IoT devices should really be thought of as part of a network. Their connections to the cloud make threats and responses closely linked to the cloud. Some of the top issues include an increasing fear of a somewhat formless threat, rookie mistakes by device makers unfamiliar with cybersecurity practices, and ongoing regulatory challenges.

Growing fear, but of what?

IoT devices are definitely going to attract criminal activity as a source of data or as an attack vector. We have already seen the beginnings of this, including data breaches that gained initial access through a connected IoT device, and the recent distributed denial-of-service (DDoS) attack on Internet infrastructure from compromised webcams. So the fear of attack is legitimate, but the form of future attacks remains uncertain. Cybercriminals are driven by money, and it remains unclear how they will leverage the vulnerability of these devices for profit. We expect ransomware of some kind, including DoS attacks that prevent the devices from being used properly, to be the easiest way for attackers to make money, and thus the biggest initial threat. The relative security weaknesses and broad attack surface of IoT devices also make them a prime target for hacktivists.

Rookie mistakes

Many companies are adding IP functionality to their devices in order to improve efficiency and collect data about device usage. Too many of these companies have little experience with Internet connectivity, and we expect them to make rookie mistakes, with things such as default passwords (which enabled the recent DDoS attack), unnecessary privilege levels, and unpatched (or even unpatchable) vulnerabilities. They will learn, but it will take years of breaches, attacks, litigation, regulation, and painful lessons.

Ongoing regulatory challenges and cultural privacy norms

Similar to what has happened with the cloud, the rapid adoption of IoT devices is creating a big gap in regulation. With consumers at the forefront of IoT device adoption, privacy concerns will be the biggest initial driver of legislation. Different jurisdictions already have divergent attitudes and regulations toward privacy, which IoT devices will only exacerbate. Lawmakers will have great difficulty keeping up with these technological advancements. Incidents and the resulting litigation, protests, consumer backlash, and corporate accountability will affect the development of legislation differently in each jurisdiction. Contradictions and uncertainty surrounding IoT regulations will be a significant challenge for multinational corporations and may even restrict IoT device adoption in some markets.

To read the full details about these and other IoT predictions, download the McAfee Labs 2017 Threats Predictions report.

 

The post Welcome to the Wild West, Again! appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/welcome-wild-west/feed/ 0
Black Friday and Holiday Shopping Dangers https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/black-friday-holiday-shopping-dangers/ https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/black-friday-holiday-shopping-dangers/#respond Tue, 22 Nov 2016 23:25:32 +0000 https://securingtomorrow.mcafee.com/?p=66494 This blog was written by Bruce Snell. As a kid, I remember hearing about the horror stories of the insanity that comes with holiday shopping.  I remember seeing people trampled the first thing in the morning on Black Friday as they battled their way to the big-ticket items that were marked ridiculously low.  It’s not […]

The post Black Friday and Holiday Shopping Dangers appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

As a kid, I remember hearing about the horror stories of the insanity that comes with holiday shopping.  I remember seeing people trampled the first thing in the morning on Black Friday as they battled their way to the big-ticket items that were marked ridiculously low.  It’s not just Black Friday either, malls, shopping centers, your local downtown all get jam packed with shoppers out trying to find the best present for their friends and loved ones (and obligatory gifts for weird relatives and coworkers).  Luckily my retail job growing up was in a local office supply chain in a small surf town in Northern California, but I heard horror stories of holiday shopping from my friends working in large retail chains.  Fast forward a few years later and we saw a rise in online shopping.  While there was still the madness of Black Friday retail raids at first light, more and more people started shopping online, saving people time, gas and sanity.  Now, we have Cyber Monday as a follow up to Black Friday and a number of retail stores have deals that you can find on their website instead of hitting the stores.  All should be right with the world, peace on earth and all that jazz, right?  Well, as more shopping moves online, the criminals are not far behind.

Scams of the Holiday Season.

“Like and share” – We’ve all had our Facebook feed littered with give-aways and contests posted by our friends and loved ones who fell for the “like and share” trap.  Typically it’s a page offering a free or heavily discounted item to anyone who will click “Like” on their page and share it on their wall.  I’d suggest you ask those friends how long it took before they received their free item.  They’re still waiting?  You may need to let your friend know that pair of free sunglasses is never going to show.  These scams are a way for cybercriminals to collect information from you.  By “Liking” their page, you’re giving them the appearance of being legitimate by adding to their apparent audience size.  You’re also letting them have ad space on your Facebook wall that they can use to sell more advertisements.  Another variation on this theme is to trick people into filling in their name and address.  You’ll see more junk mail than you will prizes if you give them this information.  If you provide your phone number, odds are you will see spam and phishing text messages before long.

Phishing – Phishing in multiple forms is always on the rise during the holidays.  Phishing can show up as a text message on your phone, through email, Facebook Messenger, via Twitter or Instagram.  Pretty much any account or platform you use to interact with people online can be targeted by cybercriminals.  Phishing relies on sending a message that tricks you into clicking on a link.  The links either download malware, or send you to a malicious website that tries to trick you into giving away sensitive information.  A common method is to pretend to be an email from your credit card company asking you to verify your account information.  It will typically lead to a website mocked up to look just like the credit card company’s site and ask for your account login information.  This information is then collected by the cybercriminal for malicious use.

Counterfeit Apps – The Android app stores have always had an issue with malicious apps posing as apps for well-known websites and brands.  Recently, hundreds of fake apps for retail and brand names were found on Apple’s App Store as well.  These apps looked very similar to the legitimate apps and had names that could trick someone who was not paying attention into installing them on their phone.  These apps would then act like a normal shopping app, but collect the user’s credit card information for other malicious use.

How Do I Stay Safe?

Be Skeptical – When you see posts on Facebook or other social media offering deals that are too good to be true, they probably are.  Liking and sharing these sorts of “sweepstake” type pages does not increase your odds of winning a prize, unless of course that prize is being scammed and flooded with spam.  Being skeptical will also help you avoid phishing.  If you get a message from your bank telling you that you need to click on a link to keep your account active, don’t click on it.  Type in the URL for the front page of your bank and use the standard login procedure.  If there is trouble with your account, you will most likely be informed when you log in.  If you are feeling particularly civil minded, you could also call your bank and let them know about the phishing attempt.  Financial institutions typically keep track of phishing campaigns in order to help keep their customers safe.

Go to the Source –  One very easy way to avoid counterfeit apps is to go to the website on your mobile browser and look for a link to the app from their website.  With Safari on iOS, if a website already has an app, you will get a box at the top asking if you want to open the page in the app or download the app if it isn’t already installed.

Update, update, update – Malware writers rely on software bugs called vulnerabilities to spread viruses.  Keeping your system up to date can go a long way towards getting rid of those vulnerabilities.  This goes for not only the apps, but also the operating system as well.  Make sure to turn on “auto update” on all of your devices.

Use security software –  If you click on a link that leads to a malicious download, having good security software installed on your device can go a long way towards keeping your system from becoming infected.

The holidays can be a great time to spend time with friends and family.  It can be a time of reflection on what’s important and a time to look forward to new beginnings.  Staying safe online just takes a little awareness and attention to detail.  Following the steps listed above will help keep the bad guys at bay so you can focus on what’s important in your life.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee on Twitter, and “Like” us on Facebook.

Stay Safe!

 

 

The post Black Friday and Holiday Shopping Dangers appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/black-friday-holiday-shopping-dangers/feed/ 0
Blogging Best Practices and Hot Topics for Security Marketers https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/ https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/#respond Tue, 08 Nov 2016 21:29:34 +0000 https://securingtomorrow.mcafee.com/?p=64367 When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a stronger social presence. Blogging also lets potential customers get to know your firm better, warming them up to seeing you as a problem solver. Blogging has become a staple component of a content marketing strategy […]

The post Blogging Best Practices and Hot Topics for Security Marketers appeared first on McAfee Blogs.

]]>
When used as part of an integrated marketing campaign, blogging can increase SEO effectiveness, help maintain mindshare, and create a stronger social presence. Blogging also lets potential customers get to know your firm better, warming them up to seeing you as a problem solver.

Blogging has become a staple component of a content marketing strategy – serving as evidence that you know your industry well enough for customers to invest time with you. That you understand their needs, wants and challenges. Through your blog, you add value to their lives, ease their troubles, offer solutions, inspire them or action, or even entertain them.

Our Guide to Better Blogging

To help you write SEO-friendly blogs that showcase your firm’s expertise I’m sharing with you our Blogging Best Practices guide.

This one page guide provides expert advice on blogging for our McAfee Partner Marketing Community. It features nine tips to enhance titles, improve timing, optimize length, and more. And our list of 15 hot security topics arms you with some of the top search terms for security buyers – writing about these topics will drive new traffic to your website and increase engagement with your customers.

My three favorite tips are:

  1. Improve Timing and Frequency – Plan blogs around the timing of key events, launches, trending topics. Also consider your upcoming campaigns and keep a regular schedule. Plan on at least one blog per month, preferably more. Finally, here are some statistics from Torque on the best time to publish and share content to maximize the click-through rate:
    • Twitter: 12PM and after 6PM
    • LinkedIn: Tuesdays, Wednesdays, Thursdays at or after 10 AM
  2. Optimize Post Format – Add bold headers to create sections in your content. This helps readers scan your post and boosts your SEO. Also use paragraph breaks to organize your thoughts so it is easier and more enjoyable to read.
  3. Include Internal/External Links – Add external links to add credibility to your statement or ideas. And drive your marketing objectives by linking to an internal asset, guiding the reader into more of your content. Also use keywords as anchor text for links.

Be sure to check out the remaining tips and our list of hot security topics in our Blogging Best Practices guide to maximize your blog’s impact within your content marketing plan.

In my next blog I’ll discuss how to find, polish, and promote the thought leadership that you likely already have available in your firm. Fresh out of FOCUS, I’ll also share a timely example of how we are doing this at McAfee.

 

This blog post was written by Regan Ogner.

The post Blogging Best Practices and Hot Topics for Security Marketers appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/mcafee-partners/blogging-best-practices-hot-topics-security-marketers/feed/ 0
Container Sprawl: The Next Great Security Challenge https://securingtomorrow.mcafee.com/business/cloud-security/container-sprawl-next-great-security-challenge/ https://securingtomorrow.mcafee.com/business/cloud-security/container-sprawl-next-great-security-challenge/#respond Tue, 08 Nov 2016 00:09:12 +0000 https://securingtomorrow.mcafee.com/?p=64285 Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers now running on 10% of hosts, up from 2% 18 months ago. Adoption is skewed toward larger organizations running more than 100 hosts. And the number of running containers […]

The post Container Sprawl: The Next Great Security Challenge appeared first on McAfee Blogs.

]]>
Containers, the younger and smaller siblings of virtualization, are more active and growing faster than a litter of puppies. Recent stats for one vendor show containers now running on 10% of hosts, up from 2% 18 months ago. Adoption is skewed toward larger organizations running more than 100 hosts. And the number of running containers is expected to increase by a factor of 5 in nine months, with few signs of slowing. Once companies go in, they go all in. The number of containers per host is increasing, with 25% of companies running 10 or more containers simultaneously on one system. Containers also live for only one-sixth the time of virtual machines. These stats would appear to support the assertion that containers are not simply a replacement for server virtualization, but the next step in granular resource allocation.

Adequately protecting the large number of containers could require another level of security resources and capabilities. To better understand the scope of the problem, think of your containers as assets. How well are you managing your physical server assets? How quickly do you update details when a machine is repaired or replaced? Now multiply that by 5 to 10 units, and reduce the turnover rate to a couple of days. If your current asset management system is just keeping up with the state of physical machines, patches, and apps, containers are going to overwhelm it.

Asset management addresses the initial state of your containers, but these are highly mobile and flexible assets. You need to be able to see where your containers are, what they are doing, and what data they are operating on. Then you need sufficient controls to apply policies and constraints to each container as they spin up, move around, and shut down. It is increasingly important to be able to control your data movements within virtual environments, including where it can go, encrypting it in transit, and logging access for compliance audits.

While the containers themselves have an inherent level of security and isolation, the large number of containers and their network of connections to other resources increase the attack surface. Interprocess communications have been exploited in other environments, so they should be monitored for unusual behavior, such as destinations, traffic volume, or inappropriate encryption.

One of the great things about containers, from a security perspective, is the large amount of information you can get from each one for security monitoring. This is also a significant challenge, as the volume will quickly overwhelm the security team. Security information and event management (SIEM) tools are necessary to find the patterns and correlations that may be indicators of attack, and compare them with real-time situational awareness and global threat intelligence.

Containers provide the next level of resource allocation and efficiency, and in many ways deliver greater isolation than virtual machines. However, if you are not prepared for the significant increase in numbers, connections, and events, your team will quickly be overwhelmed. Make sure that, as you take the steps to deploy containers within your data center, you also appropriately augment and equip your security team.

The post Container Sprawl: The Next Great Security Challenge appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/cloud-security/container-sprawl-next-great-security-challenge/feed/ 0
Chance of a Lifetime https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/chance-of-a-lifetime/ https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/chance-of-a-lifetime/#respond Thu, 03 Nov 2016 20:55:08 +0000 https://securingtomorrow.mcafee.com/?p=64175 This blog was written by Brian Dye. Writing from the FOCUS 16 Security Conference, Wed., Nov. 2 I just came out of one of the most energetic keynote sessions I have ever seen. Chris Young, who heads McAfee, mapped out a vision for the future of our company. It was overwhelming. I don’t need to […]

The post Chance of a Lifetime appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

Writing from the FOCUS 16 Security Conference, Wed., Nov. 2

I just came out of one of the most energetic keynote sessions I have ever seen.

Chris Young, who heads McAfee, mapped out a vision for the future of our company. It was overwhelming.

I don’t need to re-quote figures on the problems with cyber-attacks and security threats on the Web. It’s something we all are aware of. All you have to do is read a news site or pick up a newspaper. Security is probably the biggest challenge to the Digital Age.

Our industry – cybersecurity – is moving faster than any other segment of IT. And McAfee is right in the center of what’s happening.

This year McAfee introduced 18 new products. We developed four integrated security systems. We moved forward, fast, on our industry partnerships, which are now up to 125.

This morning Chris unveiled the new McAfee logo, which will go into full effect early next year, when the company formally spins out from Intel (though Intel is hanging on to 49% of us!). At that point we will be one of the largest pure-play cyber security companies in the world. Our goal is to also be the #1 security partner.

We aim to move even faster in 2017, and actually increase our product introductions, chiefly through organic innovation. We will continue to move into the cloud and integrated solutions, and with the opening of DXL (https://github.com/opendxl), we expect to greatly accelerate our partnerships.

If I could be personal for a moment, this for me is one of the greatest chances of my lifetime. I’m working in a great company, with a fantastic team of over 2000 engineers, at a time when what we do is needed by the world more than ever.

Chris has given us our marching orders. #1. Agile. Integrated. Cloud-based. And working together within the industry, not just turning out point widgets.

The future is open. What’s your opinion? I’d like to hear from you.

Best,

Brian

The post Chance of a Lifetime appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/chance-of-a-lifetime/feed/ 0
How Secure Is Your Private Cloud? https://securingtomorrow.mcafee.com/business/cloud-security/secure-private-cloud/ https://securingtomorrow.mcafee.com/business/cloud-security/secure-private-cloud/#respond Tue, 01 Nov 2016 15:34:36 +0000 https://securingtomorrow.mcafee.com/?p=68636 Blog post written by Peter Bury. There is a lot of emphasis and excitement around the growth and versatility of public clouds, overshadowing the strong growth and development of private clouds. A private cloud is not just a virtualized infrastructure of compute and storage services. It is an automated and orchestrated system of virtualized compute, […]

The post How Secure Is Your Private Cloud? appeared first on McAfee Blogs.

]]>
Blog post written by Peter Bury.

There is a lot of emphasis and excitement around the growth and versatility of public clouds, overshadowing the strong growth and development of private clouds. A private cloud is not just a virtualized infrastructure of compute and storage services. It is an automated and orchestrated system of virtualized compute, storage, network, and security, where workloads are provisioned, managed, and deprovisioned without human intervention. While private clouds can operate in the same models as public clouds, the tendency for organizations is to run a platform-as-a-service offering. This model usually delivers a service catalog of operating systems and related capabilities that internal users can request for their workload.

In this scenario, IT is typically responsible for securing up to the operating system, while the operating department has responsibility for application, data, and access security. It is critical that these responsibilities be clearly articulated, so that there are no gaps. The best practice to achieve this is to focus on security at the workload.

The goal for any type of environment is consistent visibility, management, policy, and threat intelligence across all functions, from a physical data center to a public cloud, and every variant in between. Focusing on the workload enables the creation of security policies based on multiple attributes that uniquely identify groups of applications, content, and purpose; for example, the operating system, owner ID, or security tag. Using these attributes, instead of IP addresses or other static elements, ensures that the appropriate policy group follows the virtual machine wherever it moves, reducing configuration errors and simplifying the overall rule set.

What is challenging about this approach is minimizing the performance impact to each workload, without sacrificing security. The solution is software-defined security. The easiest way to do this would be to put the security functions on each virtual machine, but that is neither an efficient use of resources nor an effective way to deliver consistency across all of the workloads. Instead, security functions should be delivered through the cloud infrastructure and applied automatically.

For network security functions, a virtual intrusion prevention system (IPS) is applied to each workload as it is provisioned, locking down all but the essential traffic necessary for it to function. This isolates the workloads from each other, and has the benefit of minimizing potential misuse of both east-west and north-south communications. The next step is virtual network inspection. Virtual network inspection, automatically applied when a new virtual machine is created with the appropriate policy for that workload, is linked to the workload by the predefined attributes. As a result, it moves with the workload, and is destroyed when the workload is stopped, meaning that new workloads spawn with the most updated set of policies.

Next is server security functions for the specific virtual machine. Instead of running additional anti-virus and other endpoint functions on each virtual machine, these functions are virtualized and centralized for maximum efficiency and effectiveness. All workloads on the hypervisor then have the most current capabilities. Load balancing and other virtualization features ensure that there is sufficient endpoint security processing, spawning additional security capacity when needed.

When malicious or suspicious activity is detected, predefined rules automatically take appropriate action. Possible actions include quarantining the virtual machine for forensic investigation, more closely monitoring the traffic, or stopping that machine and respawning a clean one. If sensitive data is discovered within the workload’s traffic, appropriate policies and restrictions are immediately applied, such as encrypting the data or restricting access to the virtual machine. The benefits of this single-platform, virtualized approach to private cloud security are efficient use of resources, consistent security across all workload groups, and the agility to add capacity and capabilities when needed.

For more details on this, you can view the full presentation with ISACA, available on demand.

The post How Secure Is Your Private Cloud? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/cloud-security/secure-private-cloud/feed/ 0
How Valuable Is Your Health Care Data? https://securingtomorrow.mcafee.com/consumer/identity-protection/how-valuable-healthcare/ https://securingtomorrow.mcafee.com/consumer/identity-protection/how-valuable-healthcare/#respond Mon, 31 Oct 2016 04:51:29 +0000 https://blogs.mcafee.com/?p=63794 This blog was written by Bruce Snell. Health care is a hot topic in security right now. A quick search for “hospital ransomware” returns a laundry list of news reports on hospitals as targets of cyberattacks. However, it is not just ransomware that people need to worry about. In the report Health Warning: Cyberattacks Are […]

The post How Valuable Is Your Health Care Data? appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

Health care is a hot topic in security right now. A quick search for “hospital ransomware” returns a laundry list of news reports on hospitals as targets of cyberattacks. However, it is not just ransomware that people need to worry about. In the report Health Warning: Cyberattacks Are Targeting the Health Care Industry, our McAfee Labs team digs into the dark underbelly of cybercrime and data loss involving health care records. In this case, the darkrefers to the dark web.

Following up on the Hidden Data Economy report, we looked further to see if medical data was showing up for sale. We found dark web vendors offering up medical data records by the tens of thousands. One database for sale offered information on 397,000 patients!

2016-10-27_17-36-06

These databases contained not only names, addresses, and phone numbers of patients, but also data about their health care insurance providers and payment card information.

What’s it worth?

Of course, for this to be worth a cybercriminal’s time, they must be able to profit from it. We are finding that health care records to be a bit less valuable than records such as payment card records that contain financial information. The going price for a single record of information on a user that includes name, Social Security number, birth date, account information such as payment card number (referred to as fullz in dark web lingo) can range from $14 to $25 per record. Medical records sell for a much lower price, anywhere from a fraction of a cent to around $2.50 per record.

Does this mean medical records are not as valuable? Although not as lucrative as fullz, medical record information has  higher value than just a username/password record when sold on the dark web. We think that sellers are trying to maximize their gain from the data theft. In one underground market forum, a seller listed 40,000 medical records for $500, but specifically removed the financial data and sold that separately.

Why is the health care industry a target?

Although there are regulations and guidelines for the health care industry to protect patient information, the industry itself faces many challenges. Foremost, the focus of the majority of health care workers is the treatment of patients. Because they are dealing with life and death situations, the equipment used to treat patients must be working and available at a moment’s notice. This means there is often little time to install a patch or an update on a piece of medical equipment. The equipment may also be running an outdated operating system that simply cannot be patched to protect against the latest threats. It is not uncommon to see medical equipment running on Windows 95. The medical industry is also subject to FDA regulations and approvals. There may be equipment that is approved by the FDA only on an older operating system and would need to be recertified if updated.

How do I stay safe?

Unfortunately, these data breaches are outside the control of the average person. Health care providers typically use the information they collect from you for your treatment, so you cannot withhold your home address or phone number. As a consumer, you need to be alert for health care data breaches that potentially impact you.

  • Pay attention to the news: Once discovered, medical data breaches tend to make the evening news. Even if you went to a health care provider only once to get an x-ray because you thought you broke your thumb and that provider experiences a data breach, odds are your information was compromised.
  • Monitor your credit score: A common use for resold information is the opening of credit cards or bank accounts. Subscribing to a credit-monitoring service will help you know if a new account has been opened without your knowledge.
  • Watch out for phishing: If your contact information has been stolen, you are almost certain to be the target of numerous phishing attempts. Keep an eye out for suspicious emails and text messages. You can read one of my previous blogs for tips on how to spot a phishing attempt.

The nature of today’s digital world can unfortunately cause our personal and private data to be leaked. If you stay vigilant, you can reduce the impact these breaches will have on your life.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and “Like” us on Facebook.

Stay Safe!

The post How Valuable Is Your Health Care Data? appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/identity-protection/how-valuable-healthcare/feed/ 0
McAfee MOVE AntiVirus Enables Security and Savings https://securingtomorrow.mcafee.com/business/mcafee-move-antivirus-enables-security-savings/ https://securingtomorrow.mcafee.com/business/mcafee-move-antivirus-enables-security-savings/#respond Fri, 28 Oct 2016 21:33:14 +0000 https://blogs.mcafee.com/?p=62859 Warehouse retailers thrive by taking advantage of efficiencies that happen at scale and passing those savings on to consumers. But those money-saving efficiencies aren’t just found in the merchandise on the shelves, they’re also found on the backend in the form of more efficient IT infrastructure. One such retailer with hundreds of locations worldwide uses […]

The post McAfee MOVE AntiVirus Enables Security and Savings appeared first on McAfee Blogs.

]]>
Warehouse retailers thrive by taking advantage of efficiencies that happen at scale and passing those savings on to consumers. But those money-saving efficiencies aren’t just found in the merchandise on the shelves, they’re also found on the backend in the form of more efficient IT infrastructure.

One such retailer with hundreds of locations worldwide uses McAfee Management for Optimized Virtual Environments AntiVirus (McAfee MOVE AntiVirus) to realize savings and keep its endpoints secure. Leveraging virtualization to improve the efficiency of its IT infrastructure has been an ongoing project. “Our server environment is now 98% virtualized, and any new servers are now deployed as virtual machines,” says the company’s endpoint security specialist.

To realize even greater efficiency, the specialist sought an antivirus solution that wouldn’t slow down his team by requiring installation of a scan engine on each virtual machine. McAfee MOVE AntiVirus was specifically designed for VMware-based virtual environments and is tuned specifically for VMware vShield, making its agentless mode the ideal solution for everyone involved.

“We had tremendous buy-in right away for McAfee MOVE AntiVirus. Already, we had VMware tools and other agents running on every server, so our management was sold when they heard we would be able to remove the antivirus scan engine,” the endpoint security specialist notes. “The agentless design of McAfee MOVE AntiVirus helps relieve the overhead of traditional endpoint security, while offering essential protection and performance for our global operation.”

McAfee MOVE AntiVirus optimizes the reliable protection of McAfee VirusScan® Enterprise to virtual machines (VMs) by allowing the scanning to be offloaded to a security virtual appliance (SVA) that is shared by all the VMs on the hypervisor. The SVA is delivered as an open virtualization format (OVF) package. In the agentless deployment, the SVA uses the VMware vShield Endpoint API to receive scan requests from VMs running the VMware vSphere hypervisor.

“In a virtual environment, instead of updating 100 physical servers with .DAT files, you’re actually updating the hypervisor times 100,” the specialist explains.

 

 

Additionally, McAfee ePO software enables near-real-time visibility into the entire virtual infrastructure — consisting of 25,000 virtual clients, 5,000 virtual servers, and 50 VMware Host in three vCenters. McAfee Host Intrusion Prevention for Desktop offers further protection for 25,000 endpoints against threats that users might unintentionally introduce. Finally, McAfee VirusScan Enterprise in tandem with McAfee Global Threat Intelligence protects 30,000 laptops, workstations, and servers. All this means IT admins are spending less time troubleshooting security issues — and the savings can be passed on to the retailer’s customers.

“With the deployment of McAfee MOVE AntiVirus, we were able to… secure the environment without slowing down the business,” the specialist comments. “We have the access and visibility we need to ensure that each and every virtual machine is protected.”

To read the full case study, click here or watch the video by clicking here. get your questions answered by tweeting @McAfee_Business.

The post McAfee MOVE AntiVirus Enables Security and Savings appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/business/mcafee-move-antivirus-enables-security-savings/feed/ 0
Marketing to Influence the Customer Experience https://securingtomorrow.mcafee.com/business/marketing-influence-customer-experience/ Tue, 18 Oct 2016 15:56:07 +0000 https://blogs.mcafee.com/?p=53420 Every form of marketing today is undergoing a sea change that is more than just a disruption. New digital marketing technologies are a welcome development for improving customer experience, as companies learn how to leverage data to empower customers, sharpen marketing content, and enable their sales force throughout the Customer Buying Journey. Meanwhile, marketers grapple […]

The post Marketing to Influence the Customer Experience appeared first on McAfee Blogs.

]]>
Every form of marketing today is undergoing a sea change that is more than just a disruption. New digital marketing technologies are a welcome development for improving customer experience, as companies learn how to leverage data to empower customers, sharpen marketing content, and enable their sales force throughout the Customer Buying Journey. Meanwhile, marketers grapple with how to engage with customers on their buying journey, how to organize a marketing function, and ultimately, how to deliver better customer experiences.

Indeed, research from McKinsey & Company shows a 5x bump in the growth rate of firms they call digital leaders – those using key digital technologies to modernize the B2B customer experience.

In B2B technology marketing, the engagement model has changed. Traditional marketing relied on vendors pushing content to potential customers, hoping to grab someone’s fleeting attention. Today, the customer is in charge and it’s about the buyer’s pull and inbound marketing. Fortunately, marketing organizations can now target specific personas or customer types through geo-targeting and search engine marketing.

Shift to Digital Marketing

The shift to digital marketing means the planning cycle has also changed. Marketing budgets used to be set on an annual basis with rigid control mechanisms. Today, digital marketing requires short term and flexible decision making in order to continually improve results and deliver an improved ROI.

The marketing skills required to deliver results in the new world of technology marketing are as different today as the marketing tools themselves. The acumen required is data mining and analysis with an ability to translate numbers and metrics into meaningful insight. The list of free software tools continues to grow, and each one churns out pages of data with just the click of a button. MarTech illustrates the complexity of the technology marketing landscape in this supergraphic which they shared at the 2016 MarTech Conference in San Francisco.

New Marketing Tools for Partners

The changes shaping our world can seem daunting, but marketers like us are better equipped than ever to directly improve customer experience using both new tools and new mindsets. To better navigate the digital marketing resources that McAfee supplies you, check out these two new additions to our Campaign Kits:

  • Campaign Activation Guides – outline a custom path to leveraging our content in your marketing campaigns
  • Social Cards – enhance your social media posts with visuals

These new resources are available now for the Hybrid Cloud Security Campaign Kit and coming soon to the remaining kits.

 

This blog post was written by Regan Ogner.

Sources:
MarTech supergraphic – complexity of the technology marketing landscape
McKinsey & Company – How B2B Digital Leaders Drive Five Times More Revenue Growth Than Their Peers

The post Marketing to Influence the Customer Experience appeared first on McAfee Blogs.

]]>
Everyone Loves Selfies, Including Malware! https://securingtomorrow.mcafee.com/consumer/identity-protection/everyone-loves-selfies-including-malware/ Thu, 13 Oct 2016 23:48:41 +0000 https://blogs.mcafee.com/?p=53303 This blog was written by Bruce Snell. I was talking with some of my coworkers the other day about why I wanted to jump to the larger iPhone 7 Plus.  For me it came down to the camera.  I travel a lot for work and even though photography is something of a hobby of mine, […]

The post Everyone Loves Selfies, Including Malware! appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

I was talking with some of my coworkers the other day about why I wanted to jump to the larger iPhone 7 Plus.  For me it came down to the camera.  I travel a lot for work and even though photography is something of a hobby of mine, I don’t always have my “good camera” with me, so I end up relying on my phone’s camera to take pictures of things that catch my eye.  The camera has become an integral part of a smartphone that it’s often (as in my case) a key factor in deciding which phone to use.  More companies are starting to take advantage of the ubiquitous nature of the camera phone to let you do things like simulate a fax for a signed document or making deposits through your banking app by taking a picture of the front and back of the check.  Thanks to my phone’s camera I can’t remember the last time I stepped inside a bank.  Unfortunately, cybercriminals are also learning to take advantage of your phone’s camera.

The McAfee Mobile Research Team within McAfee Labs recently discovered a piece of Android malware that uses a bit of social engineering and some sneaky code to collect all sorts of personal information, ending with a picture of your ID card. That’s right, malware is now asking for you to take a selfie.  While this particular piece of malware has only been impacting users in Singapore and Hong Kong so far, it’s always best to be aware of the current threats and prepare accordingly. Let’s take a quick look at what this piece of malware does.malware-codec

Like a lot of malware, it tricks the user into installing it by pretending to be a video codec or plugin.  By doing this, it’s actually getting the user to grant it all the permissions it needs to execute the malicious code.  On a side note, this is why we would call this a Trojan instead of a virus since it is pretending to be a legitimate application with hidden functionality.  Remember the story of the Trojan Horse?  Same concept.  Just much smaller.selfie

This malware now runs in the background, waiting for you to open specific apps where it would make sense to ask for a credit card number.  It then displays its own window over the legitimate app, asking for your credit card details.  After validating the card number, it goes on to ask for additional information such as the 4-digit number on the back.  Once fed that information, it will then proceed to ask all sorts of additional information claiming a need to validate your identity.    Age, birthday, mailing address, etc. are all collected.   After all of this info is gathered, it then asks for a picture of the front and back of your ID.  Now, not content to just get that info, the malware asks you to take a selfie with your ID in hand.  You thought taking a selfie with your boarding pass was bad!  If you entered in everything you were asked for, the cybercriminals controlling this malware would now have all the information they needed to gain access to your online accounts.  While it’s not the first time we’ve seen malware that asks for a picture, this is the first time we’ve seen this in mobile malware.  Cybercriminals have definitely turned their sights on the mobile platform.

How to Stay Safe

Don’t install shady plugins – The majority of the internet has settled on one of a handful of different formats to use for videos.  If you go to a site that is asking you to install a “codec” or “video plugin,” don’t do it.  Either that site is using an older out of date video format (that could be vulnerable to more malware) or it is trying to get you to install malware.  Either way, go to another site.  If you think you are missing a legitimate plugin, go directly to the site that makes the plugin and install it from there.  But really, most mobile operating systems have all the codecs you will need built in, so when in doubt, get out.

Don’t take a picture of your ID – You should always be skeptical when apps start asking for too much information.  Entering in payment information is one thing, but asking for a picture of your ID is a completely different ballpark.  In general, storing that sort of information on a server (picture of your ID, passport, etc.) is not a good security practice, so even if an app you are using is legitimately asking for a copy of your ID, you may want to reconsider ditching that app for another one with better security practices.

Install security software – Typically I tell people to keep their devices up to date.  However, since this piece of malware is a Trojan and installs with the user’s permissions, having your system up to date would not stop this malware.  This is one reason you need to run security software, so it can keep an eye out for malicious apps like this that find tricky ways to get onto your device.

Cybercriminals are certainly not slowing down their efforts to steal your data, but with good security practices and the right protections in place, you have a fighting chance.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee on Twitter, and ‘Like’ us on Facebook.

Stay Safe

 

 

 

 

The post Everyone Loves Selfies, Including Malware! appeared first on McAfee Blogs.

]]>
How Do I Live Safe? https://securingtomorrow.mcafee.com/consumer/family-safety/how-do-i-live-safe/ Thu, 06 Oct 2016 00:06:21 +0000 https://blogs.mcafee.com/?p=53098 This blog was written by Bruce Snell. You may have seen #HowILiveSafe floating around on Twitter.  We thought it would be a great way to share some tips from the McAfee family about what we, as security professionals, do to stay safe online.  Instead of flooding Twitter with my contributions to this effort, I’m writing […]

The post How Do I Live Safe? appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

You may have seen #HowILiveSafe floating around on Twitter.  We thought it would be a great way to share some tips from the McAfee family about what we, as security professionals, do to stay safe online.  Instead of flooding Twitter with my contributions to this effort, I’m writing a longer form post so I can go into a more detail.  I don’t want to go on for too long, so I thought I’d narrow it down to one of the top 3 things you can do to live safe online: updating everything.

Why Update?

Why do I obsess over updates?  One word: bugs.  No, I don’t have entomophobia.  I’m talking about software bugs.  Bugs (error in software code) might make your application crash or behave strangely, but they are also taken advantage of by malware writers to infect your device.  Think of a bug as broken board in a fence.  My next door neighbor’s dog “Max” found a loose board in the fence between our yards and literally nosed around until he found a way to push the board aside and get through.  This is what malware writers do.  They find loose boards (bugs) and mess around until they find a way (malware) to get through.  Now typically, malware is stopped by security software.  To expand our analogy, think of security software as me standing in my back yard telling Max he can’t come in.  It’s very effective, but wouldn’t you rather just repair the fence and not have to sit around in the middle of the night telling Max to stay on his side of the fence?  Patching and updating are like repairing the fence.  It’s a great way to stop malware from even having a place to take hold and will go a long way in keeping you protected.  Also, for some devices like smart TVs, iOS devices and others that can’t run security software, it’s the only way to keep the malware out.

So Update Already!

I’m only partially joking when I say I obsessively update my apps and devices.  My work laptop is configured by our IT department to automatically update and patch, so I don’t even have to think about it.  2016-10-05_13-47-46However, all the systems in my house have automatic updating turned on.
In Windows 10, it’s pretty straight forward: just hit the Windows key and start typing “Automatic updates” and you will soon see “Windows Update settings.” Click on that and enable automatic updates.  So that takes care of Windows 10, but what about all the apps I have installed?

Most applications have the “Check for updates” option somewhere in the settings menu.  When you enable this, it typically means the app will check for an update every time you open it up.  This is usually a pretty good option, but what about for those apps that you don’t use regularly?  An unpatched app is still dangerous when it’s not running.  For an additional safety net, I use McAfee LiveSafe which has a “vulnerability scanner” that checks for the latest updates for my installed applications. I have this scheduled to run every Friday at 5 AM.

img_3960For smartphones and tablets, we’re an iOS house.   I make sure to enable automatic updates for my iPhone and iPad by going to Settings > iTunes & App Store and making sure “Updates” is selected.  Doing this insures new updates will download and install when available and I don’t have to worry about it.  You may want to uncheck “Use Cellular Data” because the updates could eat away at your data plan.

iOS will typically let you know when a system update is available.  However, the notification may not be immediate.  When you hear there is a new version of iOS available, go to Settings > General > Software Update to see if there is a new update available.  If there is, make sure your system has been backed up recently and get to updating.

Android has so many different implementations and builds, that my best guidance is sharing some general direction on where to look for turning on auto-updates.  screenshot_20160302-162323-576x1024For specific directions, open up your favorite web browser and search for “Enable auto update” followed by the make and model of your phone.  For updating apps, you can turn on auto updates through the Google Play app.  Typically, this is reached by going into the Google Play app and going to Settings > General.  You should see “Auto-update apps” as an option.  Again, I recommend updating over Wi-Fi only so you don’t eat up your data plan.  The specific steps might be different based on your phone, but this should point you in the right direction.

Keep in mind, smartphones and tablets aren’t the only things that need updating.  Any media streaming device, like a Roku, FireTV or AppleTV will also need updating.  I suggest doing a search for auto-update options for your device to find out the exact procedure.

This is one of the many things I do to keep my (and my family’s) digital life safe.  While it can seem like every day brings a new data breach or cyber-attack, by following some basic security practices like keeping your devices up to date we can make it more difficult for the bad guys.

Updating is part of #HowILiveSafe.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

Stay Safe

 

The post How Do I Live Safe? appeared first on McAfee Blogs.

]]>
Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize https://securingtomorrow.mcafee.com/consumer/most-dangerous-celebrities-2016-rt2win-red-carpet-prize/ https://securingtomorrow.mcafee.com/consumer/most-dangerous-celebrities-2016-rt2win-red-carpet-prize/#respond Fri, 30 Sep 2016 13:00:39 +0000 https://blogs.mcafee.com/?p=52935 Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark fan sites on your browser, we’re all suckers for a good Hollywood story. But did you know that your love for red carpet stars can be dangerous? This year marks the 10th annual McAfee Most […]

The post Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize appeared first on McAfee Blogs.

]]>
Everybody loves some celebrity gossip once in a while. Whether you sift through tabloids in the checkout aisle, or bookmark fan sites on your browser, we’re all suckers for a good Hollywood story. But did you know that your love for red carpet stars can be dangerous?

This year marks the 10th annual McAfee Most Dangerous Celebrities study, revealing the stars who are most likely to infect your device through a simple online search. Turns out, Hollywood isn’t always as glamorous as it appears on the front page of People.

So, who took this year’s coveted top spot? Everyone’s favorite funny gal, Amy Schumer. Our annual study revealed that 16.11% of searches for the star’s name lead users to malicious websites. Talk about a Trainwreck. YouTube star turned teen heartthrob Justin Bieber ranked second, followed by Carson Daly and Will Smith.

mdc-2016_infographic_en-us_fnl

There is good news for fans of these stars, however. We’re kicking the list reveal off in true Hollywood fashion: with a #RT2Win contest on the @McAfee_Home Twitter handle. One lucky winner of the contest drawing will receive a $100 Amazon gift card. The best part? Entering is a breeze. Simply retweet the contest tweet published on Friday, September 30 and you’ll be entered to win. Follow these instructions to enter the contest, and good luck!

#RiskyCeleb #RT2Win Contest Rules

  1. To enter, go to https://twitter.com/McAfee_Home, and find the #RT2Win contest tweet.
  2. The contest tweet will be released on Friday, September 30th. This tweet will include the hashtags: #RT2Win and #RiskyCeleb.
  3. Retweet the contest tweet released on the above date, from your personal handle. The #RT2Win AND#RiskyCeleb hashtags must be included to be entered.
  4. A winner will be announced the following week, on Friday, October 7th.

Terms and Conditions

  1. How to enter: No purchase necessary. A purchase will not increase your chances of winning. The “McAfee Most Dangerous Celebrity study” Retweet to Win Drawing (the “Contest”) will have 1 drawing period, during which all entries must be received. Pacific Time shall control for all purposes of this Contest. One (1) winner will be chosen. The Drawing period is as follows:
  • Drawing: 8:00 AM Friday, September 30th, through 5:00 PM Friday ,October 7th. 

During the Drawing period, go to the @McAfee_Home Twitter page and go through the following steps:

  • Find the contest tweet, published on Friday, September 30th, which will include the hashtags: #RT2Win and #RiskyCeleb.
  • Retweet the contest tweet and make sure it includes both the #RT2Win and #RiskyCeleb hashtags.
  • Note: Tweets that do not contain both #RiskyCeleb and #RT2Win hashtags will not be considered for entry. 

An eligible winner will be announced the final Friday of the drawing period by 5pm PT on the @McAfee_Home feed, featuring the #RT2Win and #RiskyCeleb hashtags. Each retweet must include the #RT2Win and #RiskyCeleb hashtags to be eligible to win. No other method of entry will be accepted besides Twitter. Only one eligible retweet per person.

  1. Eligibility: The contest is open in the US to those who are 18 years of age or older on the date the contest begins. Employees of McAfee (Sponsor) and its subsidiaries, affiliates, prize suppliers, and advertising and promotional agencies, their immediate families (spouses, parents, children, and siblings and their spouses), and individuals living in the same household as such employees are ineligible.
  2. Winner Selection: The winner of the Drawing will be selected at random from all eligible retweets received during the Drawing’s entry period. By participating, entrants agree to be bound by the Official Contest Rules and the decisions of the coordinators, which shall be final and binding in all respects. The odds of winning depend on the total number of eligible retweets received.

Winner Notification: The Drawing winner will be notified via direct message on Twitter.com at the end of the drawing period. The prize winner will be required to sign an Affidavit of Eligibility and Liability/Publicity Release (where permitted by law) to be returned within fourteen (14) days of written notification, or prize may be forfeited and an alternate winner selected. If a prize notification is returned as unclaimed or undeliverable to a potential winner, if potential winner cannot be reached within four (4) calendar days from the first notification attempt, or if potential winner fails to return requisite document within the specified time period, or if a potential winner is not in compliance with these Official Rules, then such person shall be disqualified and, at Sponsor’s sole discretion, an alternate winner may be selected for the prize at issue based on the winner selection process described above.

  1. Prizes: The prize for the Drawing is a $100 gift card to Amazon.com.Entrants agree that McAfee has the sole right to determine the winners of the Drawing and all matters or disputes arising from the Drawing and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of McAfee.

Sponsor will not replace any lost or stolen prizes. Sponsor is not responsible for delays in prize delivery beyond its control. All other expenses and items not specifically mentioned in these Official Rules are not included and are the winners’ sole responsibility. ARV of the prize may be subject to market fluctuation. In the event the stated ARV of a prize is more than the actual retail value of the prize at the time of award, the difference will not be awarded in cash or otherwise.

  1. General conditions: Entrants agree that by entering they agree to be bound by these Official Contest Rules. All federal, state, and local taxes, fees, and surcharges on prize packages are the sole responsibility of the winner.

Sponsor is not responsible for incorrect or inaccurate entry information, whether caused by any of the equipment or programming associated with or utilized in the Drawing, or by any technical or human error, which may occur in the processing of the Drawing entries. By entering, participants release and hold harmless McAfee Corporation and its respective parents, subsidiaries, affiliates, directors, officers, employees, attorneys, agents, and representatives from any and all liability for any injuries, loss, claim, action, demand, or damage of any kind arising from or in connection with the contest, any prize won, any misuse or malfunction of any prize awarded, participation in any contest-related activity, or participation in the Contest. 

Prize Forfeiture: The prize will be awarded.  If the winner cannot be notified, does not respond to notification, does not meet eligibility requirements, or otherwise does not comply with these Drawing rules, then the winner will forfeit the prize and an alternate winner will be selected from remaining eligible entries for the Drawing.

Dispute Resolution: Entrants agree that McAfee has the sole right to determine the winner of the drawing and all matters or disputes arising from the drawing and that its determination is final and binding. There are no prize substitutions, transfers or cash equivalents permitted except at the sole discretion of McAfee.

Governing Law: The Drawing and these rules will be construed in accordance with local laws and jurisdictions (California).

Privacy PolicyPersonal information obtained in connection with this prize drawing will be handled in accordance policy set forth in the McAfee Privacy Policy.

The post Most Dangerous Celebrities 2016: #RT2Win a Red Carpet-Worthy Prize appeared first on McAfee Blogs.

]]>
https://securingtomorrow.mcafee.com/consumer/most-dangerous-celebrities-2016-rt2win-red-carpet-prize/feed/ 0
How to protect your smart home from security threats https://securingtomorrow.mcafee.com/consumer/protect-smart-home-security-threats/ Wed, 28 Sep 2016 08:57:00 +0000 https://blogs.mcafee.com/?p=52950 This blog post was written by Nick Viney. Have you downloaded the new iOS10 on your iPhone? If you have, you might have noticed a new app called ‘My Home’ which allows you to “build your connected home by adding lights, locks, thermostats and other HomeKit-enabled accessories.” This is the latest step in the world […]

The post How to protect your smart home from security threats appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

Have you downloaded the new iOS10 on your iPhone? If you have, you might have noticed a new app called ‘My Home’ which allows you to “build your connected home by adding lights, locks, thermostats and other HomeKit-enabled accessories.”

This is the latest step in the world of the Internet of Things and interconnected smart devices. While many will celebrate this advancement in technology, the blossoming Internet of Things is top of the cybersecurity agenda at the moment due to the risks involved with home devices being connected to smartphones, and thus open to hacking

Smart homes were certainly one of the most discussed topics at this year’s Black Hat USA conference, which was hosted last month in Las Vegas. At the event, McAfee researchers provided new insights into how ransomware could affect and infect a smart home by identifying a vulnerability in a home automation appliance and executing an exploitation of the vulnerability, allowing an attacker to plant ransomware or malware on the device.

The problem, as Gary Davis, McAfee’s Chief Consumer Security Evangelist, points out in his blog, is that security isn’t being built into smart devices, rather it’s being ‘bolted on’. That means that if an appliance fails it is automatically open to new security threats. Instead, smart devices need to have a safe and reliable default mode to revert to, as well as remote updating capabilities. This is the responsibility of manufacturers, but consumers can take steps to protect themselves and their smart devices.

Given that 71% of Americans expect at least one smart device to be in every home by 2025, how can homeowners protect themselves and their smart devices? We’ve provided some tips below:

  • Secure your WiFi network by updating your router and making sure it has secure mechanisms in place. Also, disable guest network access
  • Be in the know about what smart devices you have in your home and how they are connected. This way you can keep on top of system updates, passwords and more
  • Buy your smart devices from trusted brands that are more likely to have a high level of security and push out regular updates. When they do have updates, install them immediately
  • Install security software on mobile phones and tablets used to control IoT devices. See more of McAfee’s security software packages here.

Follow me on Twitter for more tips and advice on cybersecurity and the connected world!

The post How to protect your smart home from security threats appeared first on McAfee Blogs.

]]>
Pinching ideas on Climate Change and Cyber Security https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/pinching-ideas-climate-change-cyber-security/ Fri, 23 Sep 2016 12:17:28 +0000 https://blogs.mcafee.com/?p=52806 “We’re here to pinch your best ideas.” Those words began Mayor of London, Sadiq Khan’s remarks to a small group of city officials, regulators and private industry in New York City’s financial district this morning.  The discussion was focused on cities, climate change and the use of technology to address it while improving citizens’ lives. […]

The post Pinching ideas on Climate Change and Cyber Security appeared first on McAfee Blogs.

]]>
“We’re here to pinch your best ideas.” Those words began Mayor of London, Sadiq Khan’s remarks to a small group of city officials, regulators and private industry in New York City’s financial district this morning.  The discussion was focused on cities, climate change and the use of technology to address it while improving citizens’ lives.

Mayor Khan stated that he believes this will be the first generation to tackle climate change or the last to ignore it.  Obviously a strong commitment partially driven by a commitment to public health.  It’s estimated that 9500 Londoners die every year as a result of long-term exposure to poor air quality.

Technology can definitely play a role and providing appropriate cyber security for that technology is critical.  Whether it’s carbon neutrality (London) or 80 by 50 (NYC’s pledge to 80 percent emissions reduction by 2050 as compared to 2005 levels), renewable energy, energy efficiency, smart transportation and smart buildings will play critical roles.  And all need to be delivered securely.

As the conversation at the roundtable continued another relationship between the climate change debate and smart city cyber security emerged.  In both cases there’s a need for integration.  The New York State Department of Public Service Deputy for Markets and Innovation made the comment that everyone has a tendency to look for the ONE THING that will solve the problem – renewables, improved building stock, etc.  But the reality is that it takes many efforts that need to be integrated together to achieve the goal.

The same thing is very true for securing smart infrastructure.  We are often asked what one technology should be deployed.  The answer is much more complex.  Security must be designed in.  And for the era of the Internet of Things it is particularly important that the integrity of devices and data be ensured from the moment the system is installed.

Security built into the hardware (secure boot, identity, secure storage, trusted execution environments) can be foundational, but we also need network security and protected infrastructure in the cloud.  And it all needs to work together.

Smart, connected and secure.  And carbon neutral.

The post Pinching ideas on Climate Change and Cyber Security appeared first on McAfee Blogs.

]]>
Be on the Lookout for Scam Tech Support Calls https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/lookout-scam-tech-support-calls/ Mon, 19 Sep 2016 18:30:00 +0000 https://blogs.mcafee.com/?p=52683 This blog was written by Bruce Snell. A couple years ago I was messing around on my computer before dinner.   My wife came in with a strange look on her face as she told the person on the phone, “I think you might want to talk to my husband about that.” Once on the phone […]

The post Be on the Lookout for Scam Tech Support Calls appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

A couple years ago I was messing around on my computer before dinner.   My wife came in with a strange look on her face as she told the person on the phone, “I think you might want to talk to my husband about that.” Once on the phone I was greeted with, “Hi, this is Rick from Windows support and we’re calling because your computer is sending junk files to the internet.” I knew there was no way he was from “Windows support” since a reputable company isn’t going to call me up out of the blue like this,  but as a security researcher I was curious, so I jumped right in.

Rick said that to fix my issue he needed me to install a free remote access tool and give him access to my system.  Letting an unknown person access my actual computer seemed like a bad idea, so I let him log on to a “virtual machine” that I use for security testing. The first thing he did was turn off my security software, including the anti-virus and firewall.  After doing that, he downloaded a file that he tried to install.  Since I had additional security software in place he wasn’t aware of, the installation failed each time he tried to run it.  At this point, I had the file he was trying to install, the IP address he was connecting from and the site he used to get the malicious file. I told Rick that I work for a security company and would like to know what he was actually looking for.  I’m fairly certain he hung up before I completed my sentence.

After the abrupt end of my call, I ran a malware scan using our security software and confirmed that the file Rick wanted me to install was a remote access tool (RAT) that would allow him full 2016-09-06_11-11-26control of my system and most likely turn it into part of a botnet.

These scams have been going on for years.  We’ve seen them crop up around tax time with the person on the line claiming to be from the IRS, and at back-to-school and Christmas, when people have new laptops.  The scam artists will use any story they can to get to you to give them access to your information.  In security we refer to this as “social engineering,” using social interactions to trick someone into giving up information or installing software.  The more entrepreneurial criminals out there even outsource this activity to call centers that could be anywhere else in the world.  The goals are to collect your personal or financial information, or to get you to install malware on your system.

The best defense against such scams is to recognize them for what they are and simply hang up.

How can you tell a scam from a legitimate call?

Any company can be impersonated with this sort of scam, so it’s important to watch for certain behaviors.

  1. We won’t call you. You will not get a call from McAfee or any other reputable security vendor informing you that you have a virus.  It’s just not how these things work.  With McAfee, for example, you may enter your phone number when creating an account online, but that is used for billing information only.  There’s no connection between the number you enter into your account profile and the anonymized virus detection data we collect.  We will never make an unsolicited call to you and ask for your user name and password.
  2. Don’t give up the control. There are times when you might call a computer repair service that asks you to allow them to remotely control your machine to help troubleshoot.  That’s generally fine because you initiated the action, and presumably identified a reputable repair service.  However, if someone calls you out of the blue and tells you they need remote access to your system, never agree.  They are almost certainly not who they say they are.
  3. Go directly to the source. If someone calls claiming to be with a security vendor, government agency, cable provider, or any other important sounding place and wants to gather information about you or access your machine, give them a call back.  Ask the person on the phone if there is a case number you can refer to and end the call.  Then go to the company’s website to locate the customer support number and call them directly. Don’t ask the person calling for the phone number.

The elderly, young children and teens tend to be most susceptible to these efforts, so please make sure to talk with your family and friends about this topic and help them avoid these scams.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee_Home on Twitter, and ‘Like’ us on Facebook.

Stay Safe

The post Be on the Lookout for Scam Tech Support Calls appeared first on McAfee Blogs.

]]>
Automating the Threat Defense Lifecycle – What the Heck does THAT Mean? https://securingtomorrow.mcafee.com/other-blogs/executive-perspectives/automating-threat-defense-2016/ Fri, 16 Sep 2016 18:05:15 +0000 https://blogs.mcafee.com/?p=52647 This blog was written by Brian Dye. When we introduced our strategy at FOCUS ’15, at its core a simple concept:  create integrated security systems to automate the threat defense lifecycle so you can address more threats, faster, with fewer resources.  With the recent announcement of our strategic partnership with TPG we want to further […]

The post Automating the Threat Defense Lifecycle – What the Heck does THAT Mean? appeared first on McAfee Blogs.

]]>
This blog was written by Brian Dye.

When we introduced our strategy at FOCUS ’15, at its core a simple concept:  create integrated security systems to automate the threat defense lifecycle so you can address more threats, faster, with fewer resources.  With the recent announcement of our strategic partnership with TPG we want to further define our strategy and show how we are uniquely leading the market, making IT security as dynamic and responsive as today’s most dangerous threats.[1]

To start at the finish:  the results of these security systems will be measurable – a simple but incredibly important conclusion.  We define success not just through your satisfaction but through impact to key CISO-level metrics.  When compared to disconnected architectures, we expect these systems should be able to:

  • Reduce overall time to protection from over four hours to one minute
  • Increase incident response capacity by up to 30x
  • Improve response time from over 24 hours to less than 7 minutes

We understand that if we can’t move your metrics, we having nothing to offer but a new widget – and you have enough of those already!

Fundamentally, we are creating these integrated and automated security systems because we believe:

  1. Protect, detect, and correct are better together.  The virtuous cycle of integrated security builds the best protection technology possible, finds and contains advanced threats, and rapidly remediates them … while adapting protection technologies to block the next threats better.  Organizations with integrated security platforms are 30% better protected[2], and we want you to be part of that statistic.
  2. Only automation can overcome staffing issues.  You are clearly faced by a mismatch between your staffing (talent and volume) and the growth in number and sophistication of threats.[3]  That gap is compounded by stove-piped tools that force analysts to manually connect the dots across them, which takes even more time and effort.   Deeply automated security systems are critical to help solve that problem:  eliminate routine tasks, enable faster new hire onboarding, and free your strongest talent to tackle your hardest problems.  We expect automation to reduce manual effort by up to 70%.
  3. No vendor can do this alone.  The security industry is one of the most fragmented of any in IT and no one provider delivers the entire threat defense lifecycle.  You need a practical way to integrate new capabilities into an overall platform approach.  Only real partnerships, across industry leaders, can create true security systems that protect, detect, and correct.

Four Security Systems

With those beliefs fueling our strategy, we are building a platform-based architecture with four security systems:  endpoint, cloud, hybrid data centers, and threat management.  Each system combines multiple technologies in to a single, integrated security system that allows us to break the Gordian knot:  combining best-in-market technology with broad integration across common platforms.  We expect these will drive the superior outcomes that you deserve with a low operating complexity … to drive an operating cost structure you can afford.

bdblog_1

 

Connecting these Security Systems

Each of these systems help you address more threats, faster, with fewer resources.  That said, because these systems are themselves built on platforms they will work together to solve even bigger security problems.  To pick just a few examples:

  • Closed loop threat defense: The four systems work together to share threat information and automate protection, which improves security and lowers cost.  Using the example of a potential attack starting at the endpoint, our security systems automate the detection and response end to end (although a threat coming in through the cloud or data center would have the same flow):

bdblog_2

  • Mobile workforce security: Due to the rise of SaaS applications, mobile workers can complete much of their work using only email, SaaS applications, and local compute.  The combination of the converged endpoint and cloud-delivered data security systems is designed to create a “mobile clean zone” to secure those mobile workers’ devices, but also keep the organizations data secure while off of the corporate network … allowing them to more safely reconnect to the corporate network when needed.  This includes technology from McAfee, but also from our partners like VMware® AirWatch® and MobileIron.
  • Security for Infrastructure as a Service: Securing the workloads and access of IaaS platforms like Amazon Web Services or Microsoft Azure highlights the interconnectivity of the public cloud, data, users, and security operations center to defend it successfully:

bdblog_3

 

A Unique Point of View

A common hazard across the security industry is that vendors start describing their strategies with common words, and before long everyone sounds the same.  To help cut through the buzzword bingo, here are a few areas where we believe our approach is truly unique in the market:

  • Integration: we are combining point tools and features, using common platforms, in to integrated security systems.  You can see this in the four security systems:  each combines the capability from 3 or more point products in to a single system.  We deliver this integration and the management level with ePO™ and the threat intelligence level through DXL as well.
  • Automation: with integration as our foundation, we then build in closed loop automation.  This automation delivers more accurate detection, faster remediation, and closed loop protection.  These benefits increase directly with the breadth of products and technologies that we integrate (our own or with other security providers).
  • Orchestration: with more of your organization freed up through automation, we then proceed to orchestrate.  While automation is at the tools level, orchestration is at the systems level to not just drive actions but coordinate teams and accelerate investigation.  The gains, across both security effectiveness and team efficiency, are the most dramatic here which is why this is the ultimate goal that both integration and automation are building towards.

Really?

Overall this may be surprising to some of you, and it is more true than ever that the proof is in the pudding.  You may wonder if we can do this, and I appreciate that skepticism.  I don’t ask for your trust – instead I invite you to join us at FOCUS16 in Las Vegas this fall.  There, we will share with you the first round of technology delivery against this strategy.  I think you will be – pleasantly! – surprised.

Best,

Brian

© McAfee Corporation

McAfee, McAfee logo, McAfee® ePolicy Orchestrator® (McAfee® ePO), McAfee® ePolicy Orchestrator Cloud (McAfee Cloud ePO ) and Security Innovation Alliance are trademarks of McAfee Corporation or its subsidiaries in the U.S. and/or other countries. Other names and brands may be claimed as the property of others.

[1] NOTICE:  The information contained in this document is for informational purposes only and should not be deemed an offer by McAfee or create an obligation on McAfee. McAfee reserves the right to discontinue products at any time, add or subtract features or functionality, or modify its products, at its sole discretion, without notice and without incurring further obligations.  Performance achievement objectives stated throughout this document assume certain environment configurations and are only representative of what we want to achieve, not a statement of current performance.

[2] Penn Schoen Berland. Dates of study: 1/4/2016 – 04/25/2016.

[3] https://www.isc2cares.org/uploadedFiles/wwwisc2caresorg/Content/GISWS/FrostSullivan-(ISC)%C2%B2-Global-Information-Security-Workforce-Study-2015.pdf, pages 10-14

The post Automating the Threat Defense Lifecycle – What the Heck does THAT Mean? appeared first on McAfee Blogs.

]]>
The Quarterly Threats Report: What Does It Mean for You? https://securingtomorrow.mcafee.com/consumer/quarterly-threats-report-mean/ Wed, 14 Sep 2016 16:00:51 +0000 https://blogs.mcafee.com/?p=52584 This blog was written by Bruce Snell. The latest edition of the Quarterly Threats Report (QTR) was released this week by McAfee Labs.  If you’re not familiar with them, McAfee Labs is our research organization tasked with researching all the latest threats that people are seeing out there in the wild as well as looking […]

The post The Quarterly Threats Report: What Does It Mean for You? appeared first on McAfee Blogs.

]]>
This blog was written by Bruce Snell.

The latest edition of the Quarterly Threats Report (QTR) was released this week by McAfee Labs.  If you’re not familiar with them, McAfee Labs is our research organization tasked with researching all the latest threats that people are seeing out there in the wild as well as looking as trends that help indicate what the bad guys are going to target next.  The QTR is written to address questions faced by large organizations, but there is also a lot of great data in there for everyone else.  I’ve gone through our data to find the key things that everyone should be aware of, even if you aren’t in computer security.

Because that’s where the money is…

One of the major topics of the QTR was looking at the who, why and what around data theft.  Who are the big targets?  What is the motivation for the breach? It shouldn’t be surprising to discover that 89% of data breaches involve either financial gain or espionage.  Crooks and spies!  It may seem obvious, but it’s a number that has been steadily increasing over the past few years.  Historically data breaches have been motivated by curiosity, hacktivism, revenge, you name it.  Now we’re definitely seeing money being the primary motive behind these attacks.

What’s very interesting is that now 53% of the breaches are discovered by someone other than the hacked company.  This means your bank/credit card/insurance provider could have been hacked and not know it, leaving the cybercriminals to have free access to your valuable data without you knowing about it.  They’re also under almost constant attack.

Looking at our data, we found that retail and financial services companies are seeing an average of 20% more attacks than similar sized organizations in government, healthcare and manufacturing.  Why?  This ties back to the motivation.  The amount of personal and financial data kept by these sort of businesses make them tempting targets for cybercriminals.

Ransomware in the ER

Ransomware is my #1 most hated malware.  It started out attacking individuals but then has moved to small and medium size businesses, but has been making a move towards attacking 2016-09-13_9-42-52healthcare.  Why healthcare?  By locking people out of the infected systems, it directly impacts healthcare’s need to have no disruption of a patient’s care.  Unfortunately, a lot of medical equipment runs on old operating systems that can’t be updated with the latest security patches, making them much easier to infect.  Combine these two factors with any organization’s desire to stay out of the news and you now have a situation that pushes healthcare providers to quickly pay ransomware to get back on their feet as fast as possible.  During the first quarter of this year, a group of targeted attacks on hospitals generated about $100,000 in ransom payments.

More malware

The last three months have seen the highest amount of new malware targeting smartphones and tablets (mobile malware), and the second highest amount of “traditional” malware.  Over the past year, the number of mobile malware samples grew 151%!  Cybercriminals are definitely paying closer attention to your smartphone.  We did see less malware targeting Macs than the last quarter, but the total number of Mac malware is still more than 500% larger than it was a year ago.  Still think Macs don’t get viruses?  As you would expect, ransomware continues to grow at an accelerated pace with a 128% growth over this time last year.

One interesting standout was a dramatic uptick in macro viruses.  Macro viruses were all the rage in the 1990’s (the Melissa virus was a prime example), but Microsoft took a lot of steps to prevent these from working and malware writers moved on.  However, they saw a bit of a resurgence in the last quarter due to use in a number of spam campaigns.  As a result, there was a 200% increase in macro viruses in the 2nd quarter alone.

So what can we do?

Credit monitoring – Given the increase in attacks against financial and healthcare institutions, using a credit monitoring service will go a long way in making sure your personal information isn’t used for identity theft.  There are many great options to choose from.  There are free services that will alert you when a change is made to your credit report as well as paid services that will go the extra step to proactively reach out to you if something suspicious happens.  Many banks and credit card companies also offer free credit monitoring, so check with your provider.

Back up – If you get infected with ransomware, you typically have the option to either pay the ransom or restore your files from a backup.  In some cases, there are fixes for specific ransomware families.  You can check out No More Ransom to see if there’s a fix for the particular ransom you’ve been infected with, but if not, restoring your files from backup is the best way to go.  Many forms of ransomware will infect files on connected devices, so I recommend you do a scheduled backup to a portable hard drive and then disconnect it when not backing up.  You can also use one of many available options for online backup.  Do a bit of research and find out what works for your price range, but I recommend staying with a well-established company you are sure will be around for a while.

Update – One of the best ways to prevent malware is to update your operating system and applications.  Malware takes advantage of software bugs in order to spread.  When you keep your system up to date, you are preventing a large chunk of malware from being able to infect you.  This isn’t a 100% fix, however, that’s where security software comes in.

Use security software – Even with the most diligent attention to keeping your system up to date, it is extremely important to run security software on your devices.  As you can see from the report, many new pieces of malware are coming out every day and software vendors cannot release an immediate update for every new vulnerability that is found.  Running security software on your PC, Macs and mobile devices will help fill in the gaps and protect against those new and unknown threats.

As you can see in the report, the bad guys aren’t slowing down.  As we rely more heavily on our devices for so much of our everyday lives, it’s becoming increasingly important to make sure we keep our laptops and smartphones safe.

Stay on top of the latest consumer and mobile security threats by following me and @McAfee on Twitter, and “Like” us on Facebook.

Stay safe!

 

 

The post The Quarterly Threats Report: What Does It Mean for You? appeared first on McAfee Blogs.

]]>
Upcoming McAfee Tech Talk on Web Protection and Data Loss Prevention https://securingtomorrow.mcafee.com/business/data-security/upcoming-mcafee-tech-talk-web-protection-data-loss-prevention/ Mon, 12 Sep 2016 17:01:12 +0000 https://blogs.mcafee.com/?p=52521 How Effective is Your Web Security? Evolving Your Internet Defense Strategy Whether it’s a link clicked in a phishing email, or drive-by download from a malicious advertisement – the internet is responsible for more security incidents than any other source of attack. Most organizations still rely on the old model of URL filtering to protect […]

The post Upcoming McAfee Tech Talk on Web Protection and Data Loss Prevention appeared first on McAfee Blogs.

]]>
How Effective is Your Web Security? Evolving Your Internet Defense Strategy
Whether it’s a link clicked in a phishing email, or drive-by download from a malicious advertisement – the internet is responsible for more security incidents than any other source of attack. Most organizations still rely on the old model of URL filtering to protect their most critical assets. And in this day and age— that’s just not enough.

Adding AV scanning to internet traffic doesn’t solve the problem, since 70-90% of malware samples are unique to an organization and slip right through. In this session, Tim Roddy, Head of Product Management for Web Gateway technology at McAfee, will discuss how to evolve your web security to prevent zero-day, sophisticated malware in milliseconds while users surf. Additionally he will explore the critical integration points to drive efficiency in your security ecosystem.

Stay Out of Tomorrow’s Data Breach Headline! What’s New with McAfee DLP 10?
The cost of a data breach has increased 23% over the past two years. Organizations are struggling to implement effective data protection policies governing the flow and use of their data across endpoints, network and cloud. According to a recent data exfiltration study conducted by McAfee, about 43% of breaches were initiated by insiders – whether they were accidental or malicious. With the rapid adoption of Cloud applications and mobile devices in corporate environments, it is more important than ever to safeguard vital data residing in these risky locations. In this session, Cindy Chen, Senior Product Marketing Manager, will discuss how the latest McAfee DLP features can help you increase your visibility and control over your sensitive data residing in risky locations.

Be sure to follow us @McAfee or @McAfee_Business for the latest on online events.

The post Upcoming McAfee Tech Talk on Web Protection and Data Loss Prevention appeared first on McAfee Blogs.

]]>
The increasing threat of hackers at major sporting events https://securingtomorrow.mcafee.com/consumer/increasing-threat-hackers-major-sporting-events/ Fri, 09 Sep 2016 09:54:49 +0000 https://blogs.mcafee.com/?p=52499 This blog post was written by Nick Viney. Every year, sporting events around the world become a desirable target for cyber criminals preying on unsuspecting tourists, many of which are browsing for information online and using various WiFi hotspots that make them vulnerable to data theft. There are a number of factors that make these […]

The post The increasing threat of hackers at major sporting events appeared first on McAfee Blogs.

]]>
This blog post was written by Nick Viney.

Every year, sporting events around the world become a desirable target for cyber criminals preying on unsuspecting tourists, many of which are browsing for information online and using various WiFi hotspots that make them vulnerable to data theft.

There are a number of factors that make these types of events appealing to cyber criminals, the most important being the sheer number of tourists at the event that are unfamiliar with the local networks and are at a disadvantage due to language barriers. Because tourists are often browsing online for news about the event they are at, or looking for downloadable guides and maps, it is the perfect opportunity for hackers to steal personal information and money through scams and fake phishing sites.

photo-1455539002418-a4cd5aa3ec04

Sporting events that have been known to be targeted by cyber criminals include Wimbledon, which this year saw a 302% year-to-year rise in attacks on the official website, the Euros and Tour de France. Even the London 2012 Olympics was a target, resulting in more than 165m online cyber security incidents that year, according to cyber security officials at the time.

So how can you protect yourself and your personal information if you’re heading to a sporting event this year, or in the future? Here are some tips:

  1. If a link or email looks suspicious, avoid opening it. Free tickets and giveaways always have a catch and are usually too good to be true
  2. Avoid connecting to free Wi-Fi networks or bluetooth paired devices, it’s best to use a VPN service to encrypt all your data
  3. Invest in a portable charging device rather than connecting your USB in unsecure ports
  4. Where possible, password protect all your devices using PINs and fingerprint recognition
  5. Delete or turn off social apps that use your GPS and store data about you.

Don’t forget to follow me on Twitter for updates on the latest cybersecurity news and trends: @nick_viney

The post The increasing threat of hackers at major sporting events appeared first on McAfee Blogs.

]]>
Techies Give Back at Tech Forum https://securingtomorrow.mcafee.com/other-