2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
2010 SMB Information Protection Survey
Upcoming SlideShare
Loading in...5
×

2010 SMB Information Protection Survey

3,906

Published on

Symantec’s 2010 Global SMB Information Protection Survey found that small and midsized businesses (SMBs with 10 to 499 employees) are now making protecting their information their highest IT priority, as opposed to 15 months ago when a high percentage had failed to enact even the most basic safeguards. This shift makes sense as SMBs are facing increased threats from cyber attacks, lost devices and loss of confidential or proprietary data.

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,906
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
171
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×