Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Archives for December 2018

Three Steps to Building an Incident Response Plan

2018/12/15 by Cathy Burnham

team of coworkers reviewing a documentAccording to the Identity Theft Research Center, 2017 saw a record-high in data breaches. The statistics show that organizations are bound to experience a security incident sooner or later; what is important is that you are adequately prepared. Here are three essential steps to building an incident response plan.

Create a plan
A good incident response plan (IRP) should begin to develop months in advance. Analyze your organization’s IT environment and determine which systems, services, and applications are the most critical to maintaining operations. Then, identify what crucial data must be protected in the event of an incident. By developing a plan of action in advance, you will find any gaps in policy, technical capability, or communication that may require immediate attention.

Practice
In the case of a breach, it is essential to act quickly and swiftly. If an incident should occur, you don’t want to appear flustered or disorganized to your customers. With simulation exercises, you can put your plan in action to ensure it your cyber security solutions would be effective in a real situation.

Document and communicate responsibly
Accurate documentation and clear communication of your response activities will be necessary for legal purposes (and as a courtesy to your customers). When going public with the details of the breach, it is essential that you are prompt and clear about how the issue was caused, the actions you took to respond, and what will be done to prevent the situation from recurring.

Filed Under: Uncategorized

Viruses, Trojans, and Worms: What’s the Difference?

2018/12/01 by Cathy Burnham

green data matrixThere are many different types of malware, and some of the most common include viruses, Trojans, and worms. While the terms are often used interchangeably, each of these types of malware has significant differences.

Viruses
A computer virus is a malicious program that can cause damage by creating, moving or erasing files. Opening an infected email attachment is the most common way for your machine to catch a computer virus.

Trojans
Named after the mythological Trojan Horse, a Trojan is a malicious program which misleads users of its true intent. It is typically hidden in an email attachment or download that appears to be authentic. When the user clicks the attachment or downloads the program, the malware hidden inside is transferred to the user’s device. Once inside, a Trojan can cause damage by deleting files, stealing data, and more.

Worms
A computer worm is a program that can replicate itself and spread to other computers. While it cannot alter any files on a machine, it can cause harm consuming all of the endpoint’s available memory or disk space as it multiplies. In this case, endpoint protection software is essential as it can locate and destroy worms before they have a chance to replicate or spread to other machines.

Filed Under: Uncategorized

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Italy Temporarily Blocks ChatGPT Over Privacy Concerns
  • FDA Announces New Cybersecurity Requirements for Medical Devices
  • Report: Chinese State-Sponsored Hacking Group Highly Active

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement