Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Archives for April 2013

Log Management Tightens Data Security, Performance

2013/04/24 by admin

eBook sponsored by SearchCompliance.com

For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today’s resource to uncover ways in which log management can tighten data security and boost overall IT performance.

[Download the ebook]

Filed Under: antivirus, compliance, industry, Log Management, PCI, Products, Security News, Snare, Snare Agents

Malware hits businesses 20 to 60 times an hour, say researchers

2013/04/19 by admin

ComputerWeekly News – by Warwick Ashford

Advanced cyber attacks hit businesses 20 times an hour on average, according to researchers at security firm FireEye.

This indicates just how pervasive advanced malware capable of evading traditional security defences has become, according to the firm’s latest advanced threat report.

Data gathered from 89 million malware events, along with direct intelligence uncovered by the research team, shows that many cyber attacks routinely bypass traditional defences such as firewalls, intrusion prevention systems, anti-virus and security gateways.

While enterprises experience a malware event up to once every three minutes on average, the report said the rate of malware activity varies acrossindustries, with technology companies experiencing the highest volume at up to one event a minute.

[Read Entire Article]

Filed Under: antivirus, byod, compliance, endpoint, industry, Security News, Unified Threat Management

SIEM systems monitor compliance, combat patient data security threats

2013/04/19 by admin

SearchHealthIT – by Emily Huizenga, Editorial Assistant

HIPAA mandates and meaningful use audits tighten up the security rules that healthcare providers must follow. At the same time, a fledgling mHealth landscape heightens the risk of data breaches. All the while, next-generation threats to the security of patient data are beginning to emerge, forcing healthcare CIOs to take a longer, harder look at upgrading patient data security.

Healthcare organizations can recognize and potentially evade patient data security threats by using gap analysis and security information and event management (SIEM) software, as well as log management, said three security leaders during a recent eiQnetworks-hosted webinar, “Unified Situational Awareness for Compliant and Secure Healthcare.”

“Data security is something I don’t think you can ever check the box for,” said Ken Beasley, director of information security and information security officer at Virginia Hospital Center in Arlington. “It’s always going to be changing. It’s something you’ll always have to watch.”

Beasley said that after he and his team saw a few cost assessments from initial HIPAA audits reported in the news — including fines that ranged from $100 to $1.5 million — they immediately hired a security risk analysis consultant, a step most practices are apt to begin with.

[Read Full Article]

Filed Under: byod, compliance, endpoint, Log Management, Security News, Snare Agents

Striking majority of endpoints vulnerable to Java exploits

2013/04/17 by admin

From Secur-it.ca

By Kevin Piddle

New focus is being paid to security concerns in Oracle’s widely used Java platform. Discoveries of new vulnerabilities, the proliferation of exploit kits and recent high-profile incidents, like the sophisticated zero-day attack against Facebook in February, have signalled a growing trend that isn’t slowing down.

In an effort to gain a deeper understanding of how widespread the current Java vulnerability landscape truly is, web security solutions provider Websense used its ThreatSeeker network to assess which versions of Java were actively being used across millions of customer endpoints.

Websense published the research findings at the end of March and in a recent interview with The Standard, Charles Renert, VP of research and development for Websense Labs, called the results “surprising”.

To read the full article – Striking majority of endpoints vulnerable to Java exploits

Filed Under: antivirus, byod, endpoint, PCI, Security News, Unified Threat Management

Ransomware: Hijacking Your Data – Sophos

2013/04/09 by admin

By Richard Wang and Anand Ajjan, SophosLabs

For the last two years users have increasingly been faced with messages like this and demands for money in exchange for access to their PCs. But these are not the actions of law enforcement, quite the opposite—it’s an example of ransomware. This paper looks in depth at ransomware variants and delivery mechanisms, and how you can protect your data with a complete security strategy.

Please Click here for Whitepaper

Filed Under: antivirus, endpoint, PCI, Security News, Unified Threat Management

  • 1
  • 2
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • CISA, NSA Issue Guidance for IAM Administrators
  • Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
  • Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform 

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement