{"id":2162,"date":"2006-11-03T00:00:00","date_gmt":"2006-11-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/03\/security-threat-changing-says-symantec-ceo\/"},"modified":"2021-12-30T11:40:48","modified_gmt":"2021-12-30T11:40:48","slug":"security-threat-changing-says-symantec-ceo","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/03\/security-threat-changing-says-symantec-ceo\/","title":{"rendered":"Security threat changing, says Symantec CEO"},"content":{"rendered":"<p>The threat posed to computer users and companies by hackers is shifting from attacks on the computers to attacks on electronic transactions, according to the head of one of the world&#8217;s largest security software vendors.  John Thompson, chairman and CEO of Symantec Corp., said the change has been taking place over the past few years but has recently been accelerating.  &#8220;While a few years ago many people were much more focused on attacking the machine and attacking the broad-based activities that were going on online, now all of a sudden we&#8217;ve noticed a significant shift in both the type of attack and the motivation of the attack,&#8221; he said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The head of Symantec&#8217;s Asia-Pacific business, Bill Robbins, explained in an interview that the changing threat means businesses will not only have to spend more time and energy on making sure that data is secure, but also on recording which users are accessing and manipulating information stored in corporate databases.<\/p>\n<p>Midsize companies should sit up and take notice because hackers aren&#8217;t choosing their targets by brand name, Robbins said.<\/p>\n<p>Symantec&#8217;s warnings come at a time when fear of online crime is increasing and law enforcement agencies around the world are taking the issue more seriously.<\/p>\n<p>http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9004741&#038;source=NLT_AM&#038;nlid=1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2162","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2162"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2162\/revisions"}],"predecessor-version":[{"id":4649,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2162\/revisions\/4649"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}