 Welcome to Symantec's Norton Security. My name is Becky Wiegand, and I'm your host for today's event. I'm the Webinar Program Manager here at TechSoup, and I've been with the organization for 6 1⁄2 years prior to that spent a decade at small nonprofits in Washington, D.C. and Oakland, California, where I was regularly the person that had to decide on which tech software and tools we implemented at our office, including tools like Symantec. So I'm happy to be your host and hope that you will find today's event informing and helpful in making the best decisions for your nonprofit's technology. Also joining us is Aaron Hansen, and he is joining us from Symantec where he is the lead in the America's product marketing for the Norton segment. For the past 6 years at Symantec, he has served consumers and small businesses in delivering solutions to help them protect their digital information. Prior to joining Symantec, he worked for 9 years at Dell. So we're glad to have him as our primary speaker for today. You'll also see a number of people in the chat window who can assist you with your questions and any technical issues through the webinar. We have Jamie Barclay from Symantec who is joining us. We also have Allison Bliss, Bevan Garrett, Kevin Lowe, and Ali Bezikian who are all from TechSoup who can be on hand to help answer your questions and help you with those tech issues if you experience any. A quick look at today's agenda. We'll do an introduction to TechSoup just so we've got everybody on the line by the time we start with the meat of the program. We'll do a couple of polls to get input from you, our users, and our participants on what you're most concerned about securing and how you're using security. That will help inform a little bit of what Aaron covers in his section. He'll talk about Symantec and what Norton's goals are in helping you secure your technology. We'll talk about some of the current and future threats and tips to help you protect your organization. Then we'll introduce the new Norton security products and talk about how you can access the donations. So quickly, TechSoup is a 501c3 nonprofit and we are working toward the day when every nonprofit and library on the planet has the access to technology resources and knowledge to operate at their full potential. We do that in a variety of ways. Since 1987 we've been working to distribute donations to nonprofits and charitable organizations around the world, more than 200,000 in more than 60 countries. And it keeps going up so these numbers are already out of date. I think we're over $4 billion in IT expenses saved to the sectors around the world. So I'm proud to be a TechSoup user originally and now a TechSoup staff member. And you can find out more about our donation programs at TechSoup.org which you can see on our homepage right now is an image of the new Norton security and also linked to the security webinar in the top featured area. So if you want to be looking at the products along with us, you're welcome to do so on our website right now. Now to the crux of why we're all here today, security. It's important stuff. We know we see hackers breaching celebrity cell phones and we see Heartbleed and all of these viruses and we see ransomware taking over people's data and locking it down out there. So take a minute and let us know on your screen right now. Click on one of those radio buttons or you can actually click on more than one if you'd like. And tell us what your top security concerns are for this year. And if there's something else you'd like that's not on this list go ahead and chat it into us because these are real issues that you don't have to be a celebrity to be targeted by the various bots that are out there that are looking for vulnerabilities in your systems. They're not just looking for the holes in famous people or big company systems. They're looking for anything that they can exploit. And the technology is advancing really quickly and companies like Symantec are doing I think a really great job of keeping on top of those and creating solutions that give you holistic coverage. So I'm going to give just a few more seconds for people to respond either in the chat or by clicking those links on their screen. Ramsey comments in the chat and we know that you can't see the chat questions and comments so if there are things that we think are particularly useful for everyone we'll share those back out. But Ramsey in the chat comments that off-site cloud backup is a big security concern for 2015 and that is an ever-growing marketplace and especially in the cloud. People are concerned about being there but also we're all there already so looking at how we can do that. Peter comments backup Windows PCs. So backup seems to be a theme for both of those. So I'm going to go ahead and show the results of what people are most concerned about right now and securing their Windows PCs is the top concern with 81% responding that that's number one. Being infected by viruses or malware is 78%. So those are the two biggest areas that people are concerned with right now. And so only about 18% of you are concerned with your Macs. So most of you I'm assuming based on this response are using PCs and suffering data breaches is another big one. So thank you for taking part in that. And then one last question. This just helps inform kind of what you're using currently at your office. Do you currently enable or even in 2015 do you plan on allowing your employees, staff, volunteers, board members, patrons to use their mobile devices to access your information or resources? So that could be accessing your network. If you have one that could be making updates to your site or getting email onto their devices from your domain. So go ahead and answer that one for us. I'll give a few more seconds so that everybody has a chance to participate. We have around 50 people on the line right now. I'll give just a few more seconds so then we can move on and have Erin talk to us about Norton and what they're doing and what their newest offer is. So here we go. So around almost 70% of you are allowing your staff and employees or board members to access information and resources with their mobile devices. So I'm sure that's ever-growing. So with that I'd love to have our presenter Erin Hansen from Norton's Product Marketing Team come on to talk to us a little bit about what they're doing and share some tips on how you can secure your devices and information in this new year that we've just begun and how you can do that using Norton Security. Thanks so much for joining us today Erin. Welcome to the program. Well thank you very much Becky and thanks everyone for attending. And thanks for having me. This is very near and dear to us at Norton. You'll see a lot about Norton is around empowerment. You see this tagline here of boldly go. And it's really about enabling our customers or our users to really take advantage of all that this wonderful world has to offer in terms of taking advantage of all the technology that's available to us today. It's really about enabling you to serve your mission and purpose either as a nonprofit or a library or whatever type of organization goal that you've got. We're all about empowering that. So as Becky mentioned or are agendaed today we're going to talk about the new Norton products. But really what I want to talk about first is an introduction to Norton as far as who we are, what we stand for. I want to talk about some latest trends that we see and what we call the threat landscape out there and also give you some tips and tricks and some best practices on how to stay safe because using a security solution is really only one piece or one element as far as having a comprehensive approach in protecting your information. I thought the poll question was interesting. The vast majority of you are planning on allowing your employees or staff to use their mobile devices. And so I think it's important that we'll talk a little bit around some of the mobile security risks that we see out there. Mobility is definitely taking off. And then we'll finish up with what we're doing with our products and then talk a little bit around some of the specific solutions that you can leverage to help protect your organization. So as I mentioned earlier, this is kind of our tagline and it's really kind of our marching orders if you will. We are all about enabling our customers to boldly go. Because today it's really amazing. When you think about how much technology has advanced over just the past couple of years the fact that we have all these mobile devices that are really like strong powerful computers that we can hold in the palm of our hand. It's really amazing the way that we're able to connect today. So we're all about enabling that technology. We're going to talk about some of the trends in the threat landscape. We're going to talk about some scary stuff that's out there. And granted, there are some scary things going on out there. But that's what we stand for. We're here to help protect you against all those threats that are out there. We do that with our software and our technology. But we also do it with sessions like this where we go out and we help inform and educate around ways that you can help stay protected. We believe that everyone has the right to take full advantage of everything that this amazing new world has to offer. And you know, as I think about it I really feel like we're kind of on parallel paths here, right? I would imagine that you've got a very similar type of theme with your go-to market or with your marching orders as far as your organization, as far as what your goals are. I imagine a lot of you out there are all about empowering and have a message that really I think aligns with this is to enable people to either take advantage of technology or whether you're a nonprofit. We're here to help work with you in service of your goals. Because we believe that the free and the safe flow of information and ideas is really what's going to move us forward in our society, in our culture, and even with commerce. And I'm proud to help support a lot of small business organizations that are out there. Help them stay protected. Everything that we do is focused on protecting that freedom. And so we're known for consumer solutions. We're all about protecting your families and your kids as they go online. But we're also developing solutions to help small businesses, to help nonprofits, to help all organizations of all sizes to make sure that you're protected. Our mission is to make it easy also is make it easy to understand. Things can get kind of complex when we start talking technology and the world of tech. And so one of the themes that you'll see as I start to talk about some of our solutions is that it's all about simplicity. It's all about making it easy for you to understand, for you to use, and then get out of your way and enable you to go out and focus on what you need to do as far as advancing your goals or your mission forward. So another thing we talk about is right for me protection. And this kind of goes to the mobility piece that I mentioned earlier. It's no matter how you connect, whether it's on a Windows PC, whether it's a Mac, whether it's a tablet, or a smartphone, we are all about keeping you safe and protected regardless of how you connect. We're really known for PC security, but given the poll kind of alluded to this, given the explosion in mobile, we recognize that we need to protect mobile devices as well. So that's just a little bit about us as far as what we do here at Norton, kind of what we stand for, kind of our rallying cry, if you will. To kind of transition to our next topic, I was going to talk about some of the latest trends that we see in the threat landscape. And I kind of have it bucketed into three areas here. One is around the evolving threats that we see, that we see from the hackers and the bad guys that are out there that want to steal your data. Talk a little bit around just some vulnerabilities that we see. And then I'll kind of finish and talk about mobility and what you can do to help stay safe when you're using your mobile devices and when you're allowing your staff or volunteers to use their mobile devices to access your information. So the first thing I want to call out is that nobody, no organization, nobody is too small to be a target for the hackers that are out there. Over the past couple of years, we have seen the targeted attacks at smaller organizations increase. And we consider a small organization anywhere from one to 250 employees or staff or volunteers. And this is a message that I talk about with a lot of our small business customers because a lot of these smaller organizations or small businesses have kind of a mindset that, well, I'm a really small organization. What sort of data do I have that a hacker would want? We hear about the target breach in the news. We hear about Home Depot. We saw the Sony hack recently, right? All these big name companies make the news. And so I think it kind of lulls a lot of smaller organizations into kind of a sense of complacency around protection. If you take anything away from this session today, it's to walk away with the mindset or with the idea that you as a small organization are certainly a target. In fact, you are increasingly being targeted. The bad guys see you as a soft target. We find a lot of small organizations don't really take security seriously. They don't take a lot of steps to maintain their security posture. And it's important to note that you have data that's important either to the hackers or to yourself. And the hackers recognize that. And we'll talk a little bit around some of these new ways that they're kind of being sneaky and devious to use your data and your value of your data against you. So really kind of biggie here is walk away with the mindset that you have data that's if it's valuable to you, it's valuable to the bad guys that are out there. So our first tip here that I'll talk about is educating your employees, staff, and volunteers. The number one thing to take in consideration when it comes to protecting your information is the human factor, is the human element. So the good starting point is to have a policy in place to manage and to really have some guidelines as far as what is acceptable use of your online resources. So consider having some sort of overarching policy that's going to govern electronic communications. Even consider the appropriate use of social networks in your environment. And then with these policies established, help to educate your employees around the reasons that you have these policies. And you could even take this presentation that we're going to provide to you guys today back to your volunteers and staff and be able to have a discussion with them around the importance of just being aware. It's really an awareness thing. So tip number one is to be aware of the threats that are out there and to consider having policies in place and adhering to those policies when it comes to your employees and your staff or your volunteers in terms of access to your information. So switching gears, I want to talk a little bit around some of the vulnerabilities and the threats that we see out there. And Becky alluded to this earlier. Around vulnerability, she mentioned as an example the Heartbleed vulnerability that was uncovered around mid-2014 or so. Which was basically a vulnerability is like an open door or an unlocked window. Inherently in software, vulnerabilities will arise which is essentially a piece of code that might have been overlooked or it's basically an open window or an unlocked door and the piece of software that enables a hacker to exploit it. And so that was essentially what happened with Heartbleed. Heartbleed was like an open door in some code with regard to websites that allowed the hackers to go in and be able to exploit that open door and be able to inject some malicious code out there. So one of the things to take in consideration and why you should use a full-blown security solution either from Norton or if you're using a top tier solution out there is these vulnerabilities are out there and if you don't have the appropriate protection in place, they can exploit those vulnerabilities. We found in 2013 one in eight websites had critical unpatched vulnerabilities and this was an increase of 25% over what we saw in 2012. So we actually find that the hackers and the bad guys no longer need to host their own servers. They don't need to even set up their own websites anymore. They can go out and find these vulnerabilities in legitimate websites and they can inject their code in there and then as an unsuspecting web surfer you may visit this site and it could be a legitimate site and you could potentially download some malicious code if you don't have the appropriate antivirus or security software in place. So that's a big consideration to take into account when you're out there or even if you're hosting your own site. This is another good call out is to make sure that you have your website all the latest updates, all the latest patches. One of the things we talk about in security software is to keep it updated all the time. You are only as safe as your latest update. So keep your websites updated if any of you out there host your own websites. So that's a little around vulnerabilities. So as I mentioned, vulnerability is an open door unlocked window that allows people or allows the hackers to exploit and they exploit that with things like malware which is essentially software that is designed to be mischievous or cause havoc to your computer. So as we see malware continue to evolve maybe you guys have heard this term, hopefully none of you have been impacted by this but we've seen a new threat emerge last year called ransomware. And it's essentially malware that does kind of like what it says. It essentially holds your data hostage for a ransom. So to take a step back, the precursor to ransomware and you guys may remember this, we used to see fake antivirus. And maybe you guys used to see this before where you'd see some sort of pop-up come up on your computer. Maybe you visited a site or maybe you downloaded a program or something that might have had some of this malicious code in it. And what happened was it would pop up the screen and say, hey, we found a whole bunch of infections on your system. Click here and either purchase some bogus software or when you click fix it actually installs some malware on your system. The way malware works especially with these kind of attacks is when you don't realize that it's fake. When the gig is up and when everybody realizes it's fake, the scam fails. In fact, I venture to say everybody's security IQ out there is probably to the point where if you saw some kind of oddball random looking software like this pop-up, you'd probably say, hey, this is a fake. This is a dupe. I'm just going to ignore it. So what we've seen with ransomware was actually it was first delivered kind of like fake antivirus but it was actually delivered first as a fake notification from law enforcement that was basically dupe you into fearing that you had somehow committed some sort of crime or something online. So this was the first piece, the first precursor ransomware was they would basically pop up the screen. It would really be really scary looking. Your computer has been locked here due to suspicious or illegal activities and you need to pay us a fine and we'll go ahead and unlock your computer. The fines weren't too big. I mean it was like $100, $400 a victim. The bad guys, they got a lot of good profits out of this because they were able to scare a lot of people into paying this quote unquote fine that was really kind of a ransom. So what we see now with ransomware is it's really turn-vicious and maybe some of you have heard of Cryptolocker. This was the latest ransomware, the real big ransomware that we saw in 2014 where what the malware does is if you were to get a piece of this Cryptolocker or somehow install it, it would actually lock you out of your own computer or lock you away from your data. It would actually encrypt your information to where you couldn't access it and what the bad guys would do is they would make you pay a ransom in order to unlock your data and be able to get access back to your data. So this kind of goes to what I mentioned earlier around if you feel like you're a small organization, you feel like you don't have data, you don't have assets that the bad guys want. That may be true in some cases but it's information that's important to you. If you think about it as a consumer, your pictures of your kids or other digital information that you've got on your computer, maybe financial files and that sort of thing, all that may, pictures of your kids for example, it's not really very valuable to a hacker but it's valuable to you and they recognize that. So what they're doing is this Cryptolocker locks you away from getting access to your files and they make you pay a ransom and in most cases or in a lot of cases you actually won't get your data back even after you pay the fine. I actually was talking to a small business owner, a very small organization and they paid the fine. They had to pay $500 in order to get a key to unlock their data. The hacker was somewhat ethical in the case because they were able to unlock their data with the key that they were given. But think about that as a small business owner or even as you as either a nonprofit or other type of organization, that's $500 that could have been put towards advancing your goals or helping to build your business. So the bad guys get that and so that's something to be aware of. Having something like a Norton software or some sort of multi-layered security solution is going to help prevent these sorts of attacks. We've seen Cryptolocker, we've got the virus definitions that are going to help keep that at bay. Which leads me to our second tip, which may seem kind of redundant here, but it's to protect yourself. It's to use a modern comprehensive security solution that's going to include multiple layers of protection and to keep it updated. And when I mean multiple layers, I've kind of listed some of the layers here. Antivirus, that's really kind of what we're known for. That's one layer. Having a solution that includes a firewall, that's another layer. Including browser protection, including what we call reputation-based tools where we're able to, reputation-based tools enable us to identify threats before they've been recognized by antivirus programs. And so using something that provides multiple layers of protection. I also want to call out that there's a lot of small organizations and small businesses that use free antivirus. And generally your free solutions are only going to include one layer of protection. Usually it's just antivirus. And there's kind of an old quote, if something is free then you are the product. And you're paying with more than likely some sort of other currency like maybe your data or maybe they include ads in their product. So the call out here is to really avoid using free solutions. And in fact with the donation program from TechSoup you get some really attractive pricing you shouldn't need to resort to using free solutions. Use something that's going to give you multiple layers of protection like we have here. So the bad guys, they're following where the users are going. And we find that the spam is a percentage of email for example. And maybe you guys have noticed this. We're not seeing as much spam come across email anymore. What they're doing is they're shifting their focus over to where the users are which is on social media, on mobile devices. So you can see a couple of examples here. Back with the tragic passing away of Robin Williams last year we saw a lot of activity around using that incident to introduce malware. So you can see here, maybe if you were to click that link or that video it may install some malware. It may try to take some information out of your social media sites. You can see a couple of other examples here on the page. There was an Instagram threat that was out there that somebody would basically send a request via Instagram and they would include a link that would download malware. That little screenshot of the phone there that was actually on my own personal phone and I get these from time to time where I get kind of these weird cryptic messages that could include malware with them. So again, I think a lot of people would see especially like these unsolicited texts and maybe an unsolicited email. I think a lot of people's security IQ is pretty good in that regard. But to err on the side of caution I would advise to take some of this information to your employee staff or encourage them to listen to the recording and just help educate them on some of these scams that we are seeing out there when it comes to social media, when it comes to mobile devices. Which is a good segue into our tip number three here which is to really think about it before you click. So never view or open email attachments unless you are expecting them or you trust the sender. The bad guys are really doing their homework these days. They are doing their research and they are really getting good at being able to make emails and attachments look very legitimate. Things like invoices or PO's or those sorts of things. So just think about before you click. Be cautious when clicking on URLs and in social media. Even when coming from your friends some of these threats are designed to be when you click on them it immediately sends it out to your entire network that makes it look like it comes from you. So just be suspicious. Especially when there is a call to action to have to share content before viewing or to for example click like before you can actually access the content. Just be really suspicious of that. And especially around current events you can use a search engine. You probably heard of Snopes.com. You can use a search engine to, hey was this Robin Williams suicide video supposedly? You can Google that and probably find out pretty quick that it is a fake. So again it just goes back to the human element and being aware and being educated as far as what we see out there. Another tip kind of in these regards and this may seem kind of elementary here but it is to use strong passwords. The most important two passwords are those for your email and for your social network accounts. Generally those can really unlock a lot of other access to resources. So make them complex. The more complex the better. Use a mix of different characters, letters. Try to avoid just using words straight out of the dictionary. Replace like an S with a dollar sign for example. The more complex the harder they are to hack. Use different websites for different sites. Change them regularly. I have an example here. A lot of sites are now offering two-factor authentication. A lot of banks are doing this now. I see this a lot with banks where you log into the bank website and it may actually say, hey you know what? We haven't seen you log on in a while. We need to send you a verification code to make sure you are who you say you are. So they will send you a text with a code. That is an example of two-factor authentication. It is two ways that you can enter information to access the site. This is an example from Apple. Apple has started to offer two-factor authentication for Apple accounts. PayPal is another example where they offer two-factor authentication as well. And really two-factor just means it is two pieces of information that you have to enter to gain access to the site. A password is one factor. And then getting a code, you know, texted to yourself or emailed to yourself, that is the second factor. So it is just another layer to make sure that you are secure using passwords. We also offer a password tool. This is Norton Identity Safe. This is included as part of our Norton software. It is actually available as a free offering as well. If you go to identitysafe.norton.com, you can access this and it is a way to manage all your passwords. It actually has a password generator. So if you want to help you create complex passwords, a great site, literally I use it every day. It really helps keep all your passwords organized. And essentially all you need to know is the password for your vault and you can access and be able to manage your passwords that way. So another good resource there. So let me switch gears. I will talk briefly about mobile and then we will move into the new Norton. So when it comes to mobile devices and it shouldn't be a big surprise, I am assuming to a lot of you, given just how pervasive mobile devices are. It is the fact that the bad guys are going to follow where the users are. And the users are moving to mobile. The majority of internet traffic these days is on mobile devices. So that is where the bad guys are going. When it comes to mobile though, it is interesting. It is a mindset thing. What we find, and this is based on surveys that we have done here at Norton, is we find that people have a pretty high security IQ when it comes to PCs. So you can kind of see that on that very top row there. 90% of people are going to delete suspicious emails from somebody that they don't know on a PC. But if you look on that second row, that is on tablets. And if you look on that third row, that is smartphones. We find that people are much more likely to click on suspicious emails if you are using a mobile device. Which is kind of mind boggling in a way, because these mobile phones and these tablets, when you think about it, they are extremely powerful computers. And so we just find that when it comes to mobile security, it is a mindset thing. So if you are allowing your employees or staff or volunteers to bring their own devices, and you may have heard that acronym BYOD to be able to bring their own mobile device to access the information, maybe that is when having a policy in place or at least educating them on the mobile threats is very important, is to really help us increase the security IQ when it comes to mobile devices. Another thing we see is that a lot of people, and this goes to the kind of security IQ and mobile devices, is that a lot of users, they don't even use basic precautions like a password on a mobile device. Only a quarter roughly have some sort of security software solution for a mobile device, and the vast majority of folks aren't aware that they exist. So help us take this message out and help us to, let's help to increase the mobile security IQ for the employees and to the staff and to the volunteers that are out there. This kind of speaks to the whole password piece. We actually did a study, this is probably about two years ago now, where we strategically lost 50 smartphones in public areas. So we actually installed tracking software on the smartphones, kept them unlocked, and we dropped 50 of these in public places like train stations, Santa Monica piers. We dropped some there. And the key findings from this was kind of scary. Almost all of them, 96% were accessed by the person that found the phone. The vast majority were accessed for personal, related information, and only about 50% or so were contacted by the finder. So this curiosity, I think if you were to find a phone, I think it's just human nature. We would maybe see if it's open. I think a lot of us would be really honest and probably access it in order to try to find the person who lost it. But just be aware that these mobile devices, when you think about all the ways that they can access your information, it's very important that you keep them secured and really have the same type of mindset with mobile devices that you do for your Windows PCs. So tip number five is around mobility. It's to be mobile secure. So secure your device, use a strong password, use a security solution, and we offer that with Norton. We do provide security solutions for your smartphones. Just use caution. Think about avoiding clicking on suspicious links or texts or those sorts of things when you're using mobile devices. Another biggie here is to only download apps from official sources like the Google Play or the iTunes Store. We strongly recommend they do a pretty good job of vetting a lot of the apps that are out there. So use those official sites. So now let me transition and talk a little bit about what we do with Norton, some of our solutions. You can just see briefly here, Norton by the numbers. We have been at this for over 20 years, and we have one of the largest global intelligence networks when it comes to seeing the threats that are out there and developing the technology to really help keep a lot of these threats at bay. So when it comes to this, you can kind of see some of these staggering numbers here as far as the number of consumers that we protect, the number of attacks that we block. This is what we do. This is our DNA. So to that end though, we've also kind of made things a little difficult. In the past, we just made it too difficult to choose security software. You can kind of see some of the qualifications, really some of the hoops that we've made people jump through in order to select which Norton software you needed. Maybe you think of Norton Antivirus, or maybe you think of our Norton Internet Security product. I mean, we were pretty guilty of this. If you look at what we used to offer, we just had way too many solutions to pick from. So if you've been in a retail store, in the past or something, you might have just been bartered by this wall of yellow, and what do I really need? I need protection. Is Internet Security right? Is this Norton 360 multi-device right? What sort of solution do I need? So what we've done, and we actually introduced a new Norton solution just this past September, which is we've essentially consolidated all those various offerings into one solution, or to one service, with a couple of right-for-me offerings. So we now offer Norton Security, and we also offer a Norton Small Business product, both available as part of the TechSoup donation program. So these all include the best of Norton. So we no longer ask you what level of protection you want, what kind of devices you want to protect. It's all in there. So essentially you need to think about do I need just a Norton Security solution, or would I need a Norton Small Business solution? And I'll talk briefly a little better on the difference between those here in just a minute. But again, it's the best of Norton. So we've got rid of, for example, Norton Antivirus, which was kind of the good protection. Then we had Norton Internet Security, which was kind of the better protection, and then we had our Norton 360, which was the best. We really kind of got away from this good, better, best type of methodology, and we basically said, you know what? It all should be in there. So regardless of Norton Security or Norton Small Business, you get it all. So you get the anti-malware, you get the firewall, you get spam and phishing protection, you get our cloud technologies, you get all those layers of protection that we talked about. So you get multiple layers of protection, and it's for all the devices that you run. So for example, both of these are multi-device. At a minimum with Norton Security you can protect five devices, and it's any combination of devices. So you know, I know the poll question earlier, a lot of you want to protect Windows PCs. We can protect those. We can protect Macs. If you have a mobile Android or an iOS device, we can protect those as well. Any combination of devices that add up to five, we can protect with the Norton Security solution. You can even retire old devices. So if you're using Norton Security on some Windows PCs and you decide to migrate over to Mac or you decide to buy a new computer for Windows 8, you just move that license over to your new device and you're all protected. So you can, it's very flexible. You can move them around. And again, it covers all the major operating systems that are out there with these solutions. So as I mentioned, Norton Security is going to give you protection for up to five devices, and really the key difference here between Norton Security and with Norton Small Business is it really comes down to management and being able to grow your devices. So if you're a smaller environment, about five systems or so, Norton Security is the way to go. If you have more devices, if you need to support 10 devices or 20 devices, or if you want the flexibility to be able to add more devices in the future, then Norton Small Business is that solution. At the end of the day, they include all the same levels of protection. It's all the same technology. You don't sacrifice your level of protection. It just really comes down to the management. Do you want to have a little bit more capability to add more devices, be able to manage and monitor devices then? That's when the Norton Small Business solution comes into play. We also offer semantic solutions as part of the TechSoup donation program. Some of you may be aware of the semantic endpoint protection products as well. Really the key difference between these two is Norton Small Business is going to scale upwards of 20 or 25 devices or so. What we find is when organizations kind of get beyond that 20-ish threshold, then that's when you likely may need a solution that's going to provide you a little bit more robust control, monitoring, and management. That's really where the semantic endpoint protection comes into play. If you need to be able to customize your protection policies, do group management, get very detailed types of reporting, that's when something like a semantic endpoint protection would be a better fit. But if you need to protect your Windows PCs, your Macs, your smart phones, your tablets, and get that protection for around 20 volunteers or employees or what have you, then Norton Small Business is the way to go. I'll leave you here with a couple of resources for more information. Just about all those tips that I'd referenced are all from blogs or tweets that we've done or posts that we've done on Facebook. So if you want to follow us on Facebook, there's the link there or at Twitter or norton.com. There's a lot of good security resources at norton.com. And I think with that I'm going to hand it over to Becky and she's going to help you with the TechSoup platform and help educate you on how you can get these through TechSoup. So Becky, I'll hand it back over to you there. Great. Thank you so much for that, Erin. Really useful tips. And it's great to know that Norton has really been taking the feedback from not only our community but all of these communities around the world that use your products and helping to combine the best features of many of your products into single solutions. So I'm happy for that. And I think it's a much simpler option for people. So just wanted to show quickly where to get donated Norton through TechSoup. I can also share my desktop so that you can see on screen where to get it. But this is what the Symantec product catalog landing page looks like on our site. And you'll see down at the bottom of the page the link, it's just TechSoup.org slash Symantec dash catalog. And you'll see that Norton security donations are now available for eligible nonprofits and libraries in single, five device, ten device, and 20 device license packs. And you can see the different prices on these pages. And then the enterprise products are also available which he mentioned, endpoint protection. So you can see the different options. I'll show it live on my desktop so that you can see what it looks like to get there and find your way there yourself so that you can look at the different options and see what might best fit your organization's needs. So it will take just a moment for that to pop up hopefully. And I can then show you where to find them. And if you go to our homepage which hopefully should load up here in just a second, you can see on TechSoup.org under the Get Products tab on the upper left side that it's still loading on my screen so I'm just talking my way through it. But on that screen you can browse by donor or partner. And so you wouldn't look for Norton on that list. So hopefully you're seeing the TechSoup.org homepage right now. And on the Get Products and Services tab up in the upper left, you want to look at Get Browse Catalog by Donor or Provider. And even though we've been talking about Norton products today, it is Symantec that runs those programs. You come all the way over here to Symantec and select that. And that takes you to the Symantec catalog page that I had screenshots of before. If you're not yet in TechSoup System as a registered organization, I would recommend doing that if you're a 501c3 nonprofit, a church, a library because lots of donation programs may be available to you. And so here's where you can see the Symantec donation program page. And you can click this big blue button to browse the different products. It defaults to landing on the new Norton products on this page. So hopefully you're seeing that. And you can see that there's a drop-down box here where you can look at those enterprise options as well. So you can look for small and medium enterprise products or large enterprise products. So if you're looking to manage security and cover devices over 20 or 25, like what Erin had alluded to, that's where you'd want to look for those. But for those of you that are looking for the new Norton security and you think you don't need more than 20 devices of coverage, this is where you'll find those. And you can see the admin fees. You can view the details of each of those products. So say I have five staff people and we want to cover each of their computers and their tablets that they may use for growing the conferences. So I would need 10 devices worth of coverage. So I would want to get the subscription for 10 devices. And that's a $20 admin fee. You can see that it's available. You can see that it's a downloaded product through the donation program. So you wouldn't physically get a box like this in the mail. And you can look here to see what it includes, what's in the latest version, links on how to choose and how to obtain the product, all of these details listed here. And then you can also look at system requirements. So if you're putting this onto older equipment or hardware, you'd want to click through and look at this on Norton's site to see what the requirements are to make sure that there's compatibility there. And then if you're not sure if you're eligible, this eligibility and restrictions tab might answer some of those questions for you around how to access these donations. And just keep in mind that you can access one semantic Norton security product either Norton Small Business or Norton Security, and up to 20 licenses for Norton utilities within a fiscal year. So that's July 1st through June 30th. So if you have five staff people now but you think you're expanding to 10, make sure to keep that in mind so that you're requesting as much as you need for the course of that fiscal year. So I'm going to go ahead and bounce this back. That's how to find those donations. And we hope that you'll look and read those details in the description and requirements so that you're not missing out and so that you're selecting the right products. I also want to show you really quickly that we do have some additional resources on TechSoup's site that can help you make the best decisions for you. And so once again, that's a link to the Symantec catalog. We have a whole security articles on how to section. We have webinars and other events that we've done like this one, Online Safety for Nonprofits and Libraries is a webinar on security and safety online. We have a lot of different resources on our site and you can always ask in our community forums too. We have a whole forum thread that's just dedicated to security. So if you want to ask about people's experiences and their organizations, or post a specific question about yours, it's a great place to do it to make sure that you're getting the best product for your needs. With that, I'm going to go ahead and start fielding some of these questions that have lined up in the queue. So Erin, we've got a question from Scott who asks, does identity safe work on other platforms like Android and iOS devices and can you sync devices? Do you know about that one? I know that's not your specific area of focus but you may know more about identity safe than I do. Yeah, yeah, for sure. So yeah, identity safe will work on mobile devices. There's an app on the iOS app store. I believe there's also one for Android and for certain it works on Windows systems. I'd have to go back and double check. I don't believe that there's a plug-in for the Apple Mac platform but it's essentially a cloud based, a password management system. So if you have access to a browser, you can log in with your Norton account and access it. Kind of a shameless plug here. I use an iOS device and it will sync all your passwords across your devices. So if I access identity safe using my iOS app, I'll be able to access all the passwords, whether I entered them on a Windows system or on a Mac system. So short answer or I guess kind of a long answer to say yes, there are multiple apps out there for identity safe. Great, thank you. Tommy asks, can you get a bundle of protection for PC and mobile devices? And I'll just go ahead and answer that. This is what we're talking about that you can access multiple device coverage with Norton security or with Norton Small Business. So that's what we just looked at and it will cover PCs and mobile devices. We also have a question from Thomas. He asks, does Norton Small Business facilitate remote monitoring or remote renewals? So Norton Small Business will support remote monitoring to a certain extent. You can be able to look at all the devices that you have under protection and you'll be able to see the status of those devices. So you'll be able to see kind of a green check mark if it's all protected, if it's got the latest definitions or you may see a red X indicating that hey, this maybe hasn't been online in a while or maybe it just doesn't have the latest virus definition. So you can also send email invites to people to get Norton on there. So to a certain extent you can certainly monitor and manage your remote devices using the Norton Small Business software. Great. So Ramsay asks that he says we're using Norton 360 on 28 computers and utilize Norton Cloud Backup. How does that work with the new products? Is there a Cloud Backup included in any of these or is there a way to use those together? Do you have any recommendations for their setup? Sure. And that's kind of where the difference between Norton Small Business and like say the previous Norton 360 went because with Norton 360 you might have been able to get it with three PCs or with five and that was kind of your limit. And otherwise you're kind of doing one-to-one management of those systems versus Norton Small Business was designed to be more one-to-many. So the business owner or the administrator could easily send out those emails for the employees or send out those emails to those devices to get protection. So from a management perspective that was kind of why we created Norton Small Business. Now you touched on backup and we do not yet include backup as part of the Norton Small Business solution. Backup is something that we're certainly looking at for the Norton Small Business product. Now in terms of full disclosure we also have a Norton Security with backup solution but that is not included as part of the TechSoup program. What we offer today is Norton Security and the Norton Small Business solution. So hopefully that helps answer that question. Thank you. I think hopefully at least that gives them some place to start and move forward. So a couple of folks are asking about renewals. And so this may not be a question that you may know the answer to, you may. So I'll ask it and if you don't I can also chime in with what I know. So Tom asks, or says I have a copy of Norton 360 from TechSoup last July. Do I have to wait until this year's July 1st to get Norton Small Business? And I believe that the answer would be yes, that it's one of these products per fiscal year. So from July 1st to June 30th if you have already requested one since last July 1st then you would have to wait until after this year's fiscal year and to make another request for your organization. But on that note Thomas asks, or says annual renewals are time consuming. Can these be done centrally or remotely? Is there a way to manage renewals that you are aware of? I don't know that there is through our system. Well that's what we've done with Norton Small Business is to make it essentially one license if you will that you can have all your computers be able to kind of be synced as far as their licenses are concerned, or the subscriptions I should say because it is a subscription that you are getting for a year. So if you do have concerns around having a lot of different devices and if you are worried about those all having different expiration dates then I'd suggest taking a look at the Norton Small Business because you can get it as a 5-pack, a 10-pack, or a 20-pack. And all those 10 or 20 or 5 systems would all have the exact same subscription length and you just need to renew that once a year. Great. And so that is something somebody else asked that they had requested this through us but didn't know how to renew it and they pay for it separately for Norton 360 and that's the process is to come back to us and request that again on an annual basis to get renewal of that subscription. Let's see, what else do we have here? We have Edward comments that they have a Norton free product that comes with Comcast. But Comcast now says they no longer support it. So they are not sure if that is a good product or if they should be investing in something through the TechSoup donation program. I'm imagining that the Comcast free product may be a consumer-based or consumer-grade product to protect your individual email but I don't know that to be sure. But if they are not supporting it, I would definitely, personally, I would recommend going to something that is supported. But Erin, I'd love your take on that as well. Yeah, we do provide Norton with some of the Telcos or the Internet Service Providers that are out there. We do provide a Norton security suite as part of Comcast. It is essentially the same solution that you can get with the Norton security. However, I believe there are limitations on how many devices or how many users that are out there. But if you are saying that your service provider is either changing it or no longer supporting it, then I would encourage you to take a look at the TechSoup site and if you've done any kind of price comparisons, you'll just find that it's an incredible offer that you guys are able to get with TechSoup as far as if you compare it to MSRP pricing out there. Right. And we are just about at time and really with the admin fees through TechSoup, the products are donated fully through Symantec. So they do the donation and TechSoup charges and administrative fee. It depends on the product donation but it's usually 4 to 10% of what the retail value is. So it is a huge savings to the sector and that admin fee is paid to TechSoup to help continue our programs. And we are nonprofits so we are not making money off it. Anyway, if you would like to learn more and talk more if we didn't have time to get to your questions, please go ahead and join us in our community forums at techsoup.org slash community. There is a full thread that's just dedicated to security questions. I'm going to show this resource slide once more and we'll send these links as well as the ones that were mentioned during the webinar out in the follow-up email that you'll get in a little while. Lastly, I'd love to invite you to join us for upcoming webinars. We have two actually next week, one on engaging volunteers as tech trainers in public libraries and one that's going to be talking about how to make grants research simple. So if you're looking at grant writing coming up and you need to research those grant makers, please join us for that. And then on the 29th, we'll be talking about how to get a new tech plan in place for your mission-driven organization. So please join us for those. Thank you again, Erin, so much for taking the time to join us today. Thank you to all of the folks on the back end who are helping answer questions. And thank you to you, our participants for engaging with us and asking your great questions. Sorry if we didn't get to all of them today. Lastly, thank you to ReadyTalk, our webinar sponsor who provides the use of this platform and the ReadyTalk 500 tool for us to provide these webinars to you on a weekly basis. You can learn more about their program at TechSoup.org slash ReadyTalk. And when your screen closes, please take a moment to complete the post-event survey so we can continue to improve our webinar programming. Thank you so much everyone. Have a terrific day. Bye-bye.