


The company's Norton 360 product offers a comprehensive and easy-to-use platform which helps customers prevent, detect and restore potential threats and damages done by cyber criminals. This feature is the company's primary growth driver. NortonLifeLock is a provider of consumer-centric antivirus software, which offers protection across three cyber-safety categories, which are security, identity, and privacy. Protection In Three Cyber-Safety Categories The company's Avira security product offers customers a portfolio of security and privacy solutions.

The company also offers LifeLock identity theft protection solution. The company's Norton 360 platform offers customers extensive cyber-safety solutions at a subscription price.

With increasing number of people joining the digital world every day, Norton's cyber-safety solutions are witnessing rising demand. NortonLifeLock offers its customers the world's largest consumer cyber-safety platform. I believe long-term investors can buy the company's shares gradually utilizing pullbacks to maximize their gain. The company's strong cash flow generation will help it rapidly pay off its debt, which will result in meaningful long-term bottom-line improvement. The company's new security capabilities, such as Norton AntiTrack, and location-based tracking of children, will drive revenue growth in the coming quarters. I expect the company's revenue will grow at a CAGR of mid single-digits in the next five years driven by its Norton 360 platform, premium-level products, and Avast acquisition. The trick here is to prepare for all of these attacks and not just respond to this one only.NortonLifeLock ( NLOK) is a cybersecurity company with significant long-term customer-growth opportunities. Tomorrow it will be another impersonated brand. Users that undergo this training to be security conscious are 87.5% less likely to fall for a phishing scam like this. This attack obviously is of a personal nature – it’s important that users be educated through Security Awareness Training to be cognizant of the implications to the organizations should an email turn out to be a cyberattack and, therefore, work with a vigilant mindset. The ramifications of this are endless – access to corporate endpoints, installing keyloggers and waiting for the right set of credentials to facilitate lateral movement, monitoring of financial transactions, and more. Persistence is achieved by saving a PowerShell script on the user’s %temp% folder and configuring the registry to ensure the script is run each time the system boots. Utilizing Windows tools including CMD and MSIexec, the infection results in the installation of NetSupport Manager, a legitimate remote control software. Once the user enables macros and enters in a confirmation password of the letter ‘C’, the embedded macro takes over.
