Microsoft Security Essentials for Small Business for Free

 

Information taken From the Microsoft site

Beginning in October, owners of small businesses like the bike shop above can download and use Microsoft’s award-winning antimalware service Microsoft Security Essentials for free.

“Small-business owners just want to concentrate on running the business, without worrying about PCs going down,” says Jeff Smith, director of Marketing for Microsoft Security Essentials. “We talk to lots of small-business customers every day, and we understand that security is a top priority.”

The problem is, most security products for the business world were designed with larger companies in mind. From a small company’s perspective, high-end security suites are an unwieldy technology to manage — complicated, expensive and time-intensive.

“For small-business owners, just getting the business up and running is a full-time job,” Smith says.

For this reason, Microsoft is announcing that beginning in early October, Microsoft Security Essentials will become free to use for organizations with up to 10 PCs.

Originally released last year for single-PC use at home, Microsoft Security Essentials was designed as a comprehensive security solution in a lightweight package. Smith says a growing chorus of requests prompted Microsoft to extend the service to small businesses.

“When we launched Microsoft Security Essentials last year, small businesses kept telling us that it was exactly the type of thing they need at work too,” says Smith. “What they really wanted from their antivirus software — inexpensive, quiet protection from a provider they can trust — were all things Microsoft Security Essentials could clearly Smith says Microsoft Security Essentials can be downloaded, installed and put to work with just a few clicks. Upon installation, it scans the PC to make sure it’s clean from the start. Once Microsoft Security Essentials is working, it downloads updates and schedules scans on its own.

Over the past year, the product has won awards and certifications from a number of independent agencies, such as ICSA Labs, West Coast Labs and PC Advisor, and last January, PC Advisor named Microsoft Security Essentials to its list of the “Best Free Software.”

Says Smith: “This is a full-featured, top-tier security solution that we’re offering to small businesses for free. You don’t need a credit card. It requires no registration, no trials, no renewals. It doesn’t collect any information. It runs well on older hardware. It’s easy to use, easy to get, and it’s from a trusted source. Basically, Microsoft Security Essentials just works.”

But if the product is so successful, why offer it for free? According to Microsoft’s internal research, although 80 percent of PC owners in the U.S. say they have the most up-to-date antivirus protection, in reality only half that many actually do. Often they have signed up for free trials or subscription-based services that have lapsed. Others are just using outdated versions of security software on older hardware.

Smith says these issues become more dramatic in developing economies, where not everyone has a credit card or broadband network access to download large files.

“We want the entire Windows ecosystem to be secure,” says Smith. “By making Microsoft Security Essentials so broadly available, everyone wins. And we think small-business owners are going to be really happy with what they get. This is just what the market needed.”

Microsoft Security Essentials is now available in 74 markets worldwide and 25 languages. To learn more about Microsoft Security Essentials and download the product for free, visit http://www.microsoft.com/security_essentials/.

 

Webinar Title – “Understanding Cyber Security Risk Management

Date – September 22, 2010 – Time – Noon – 1 PM ET this is a 1 hour session.

I will be presenting a webinar on risk management.

Cyber Security Risk Management is concerned with the process of managing or reducing potentially harmful uncertain events due to the lack of effective cyber security.

Global Knowledge introduced an exclusive four-part Webinar series devoted to the subject of Cyber Security, based on our recently announced hands-on cyber security course entitled Cyber Security Foundations.

In Part Two of this Webinar series, we will examine "Understanding Cyber Security Risk Management."  As a Security professional you need to understand the risks that affect your company.  This session will help you:

1.       Save company data

2.       Save the company reputation

3.       Save your job

Outline:

In this session we will cover the basic steps of:

How do you Identify business risks

How do you Identify business assets

· Risk Management

· Risk Management Process

· Threat Determination

· Risk Assessment

· Risk Management Lifecycle

To register for this Webinar, go to:  https://gkevents.webex.com/gkevents/onstage/g.php?t=a&d=667243492

 

Internet Explorer 9 Beta released

A IE 9 has a new new interface increases your viewing area, and enhanced integration with the Windows 7 operating system means you can pin websites and applications directly to the taskbar and create customized Jump Lists that put the tasks you use most often just one click away. And a robust set of built-in security, privacy, and reliability technologies makes browsing safer than ever.

Explore a more beautiful web.

 

Check out the hardware acceleration increase browsing speed,  check out web sites using HTML5 and advancements security in Internet Explorer 9. by trying the Beta.

 

Windows 7 Talk for end users

This Thursday night  I will be at the;

NYACC (New York Amateur Computer Club Inc) General Meeting Thursday   September 9, 2010  at  7PM
NYU Silver Building   See front desk for room number
32 Waverly Place (just east of Washington Square Park)

Windows 7
Presented by Jayson Ferron
President Association of PC User Groups
Get an understanding of what’s new, what improvements are in the OS and its hardware requirements. See the new User interface, Security features, and much more.

The Start menu features integrated desktop search which can help you find and launch almost anything on your PC. Just type in a word, a name, or a phrase, and Quick Search can find the right file for you. But more than that, the new start menu makes it very easy for you to navigate across all of the installed applications on your PC.

Learn new desktop tricks that make it easier to work with multiple documents.

The New York Amateur Computer Club was established in March 1975 with the mission to further education in diverse areas of personal computing. The presentations at monthly meetings cover various platform computing systems and range from in-depth technical subjects to general overviews with broad appeal.

General meetings are always held on the second Thursday of each month and start promptly at 7 PM with announcements followed by a period of Questions and Answers called Random Access in which members and visitors are encouraged to ask technical questions or ask for advice on purchasing or using software, hardware, and related issues. There is a short break before the main presentation to enable attendees to meet and greet each other and to buttonhole people to get more detailed answers to specific questions. As an alternate to the main meeting, if a few people are interested, a new- or prospective-user group meeting is held to assist beginners.

The general meetings are open without charge to the public.

We meet at New York University (NYU) in the Silver Building (the main administration building) each second Thursday of the month. The website of the club, www.nyacc.org has the latest information regarding meeting location and subject of the main presentation. Room location is always available at the main floor security desk of the building. NYU requires some form of photo ID (driver’s license, school ID, Corporate card, etc) to enter the building.

 

I will be speaking at 2011 Cyber Crime

header

On the following topics

  • Securing the Weakest Link
  • Security for the Network Administrator
  • Understand the Security Concerns Associated with Virtualization

Stay Tune for more information as the event draws closer.

Information on the conference is here at http://www.dodcybercrime.com/

UNIQUENESS OF THE CYBER CRIME CONFERENCE

This conference focuses on all aspects of computer crime and incident response including intrusion investigations, cyber crime law, digital forensics, information assurance, as well as the research, development, testing, and evaluation of digital forensic tools.

The goal is to prepare attendees for the new crimes of today and the near future. Speakers will discuss new approaches and new perspectives with the current movers and shakers in cyber crime.

Location of Identity Theft Talk

I did a webcast on Identity Theft last week, and people have asked can I view it again. The Webinar was recorded and is available for playback by clicking here.

“Arming Your Company (and yourself) Against Identity Theft” was the first in a four-part Webinar series introduced by Global Knowledge.

Be sure to watch for the remaining three parts of this Webinar Series devoted to the subject of Cyber Security:

Part Two: Cyber Security – Risk Management 9/22 – To register for this Webinar, go here.

Part Three: Cyber Security – Physical Security 10/27

Part Four: Cyber Security – Patch Management 11/17

Free e-book: Introducing Windows Server 2008 R2

Learn about the features of Windows Server 2008 R2 in the areas of virtualization, management, the web application platform, scalability and reliability, and interoperability with Windows 7. Sign in to download Introducing Windows Server 2008 R2, written by industry experts Charlie Russel and Craig Zacker along with the Windows Server team at Microsoft.

To download the book click here.

 

Online talk on Identity Theft

I will be presenting a talk on Identity Theft on 8/25/2010 at 12:00 PM ET.

You can  attend this free webinar by going here

Hardly a day goes by without hearing about someone becoming a victim of identity theft or learning about another corporate data breach. Corporations and individuals are constantly under attack by cyber criminals. Since 2005 more than 300 million records containing sensitive information have been involved in security breaches in the US alone!

Global Knowledge is introducing an exclusive four part Webinar series devoted to the subject of Cyber Security, based on our recently announced hands-on cyber security course entitled Cyber Security Foundations.

In Part One, "Arming Your Company (and yourself) Against Identity Theft" we will examine the following topics:

  • Understanding what information cyber criminals are after
  • How they obtain this information
  • How to protect your company and yourself from being victim
  • How to recognize if information has been stolen

Be sure to watch for the remaining three parts of this Webinar Series:

  • Part Two: Cyber Security – Risk Management
  • Part Three: Cyber Security – Physical Security
  • Part Four: Cyber Security – Patch Management

You can  attend this free webinar by going here

The presenter is  Jayson Ferron, CEHI, CISM, CISSP, CWSP, MCITP, MCSE, MCT, MVP NSA-IAM,

Jay Ferron brings more than 20 years of experience in security, networking, virtualization, and high performance computing. A multi-faceted author, trainer, speaker, and designer, Jay has led the development of Windows and UNIX security designs, network infrastructures, enterprise designs and installations for numerous Fortune 500 companies as well as government and health agencies.

Jay is the author of more than 15 courseware books and papers for Microsoft and other vendors on security, networking, and virtualization technologies. In his current work at Global Knowledge, he is building a unique cyber security program that provides a global perspective of the challenges of designing a secure system.

 

Microsoft Security Intelligence Report Volume 8

Microsoft post a report on the state of security that is very telling on the state of security and trends affecting users.

The Microsoft Security Intelligence Report (SIR) is a comprehensive and wide-ranging study of the evolving threat landscape, and addresses such topics as software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. An example to the kind of date has been taken from the latest report, shows trends in malware.

Untitled

Volume 8 of the Microsoft® Security Intelligence Report provides in-depth perspectives on malicious and potentially unwanted software, software exploits, security breaches, and software vulnerabilities in both Microsoft and third party software. Microsoft developed these perspectives based on detailed analysis over the past several years, with a focus on the second half of 2009 (2H09)1.
This document summarizes the key findings of the report. The full Security Intelligence Report also includes deep analysis of trends found in more than 26 countries/regions around the world and offers strategies, mitigations, and countermeasures that can be used to manage the threats that are documented in the report.
The full Security Intelligence Report, as well as previous volumes of the report and related videos, can be downloaded from www.microsoft.com/sir.

For any security profession this is a great resource.

Get the full report here.