Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Five Ways to Detect a Cyber Threat

2018/08/06 by Cathy Burnham

phishing security testIn order for businesses to counter the ever-growing amount of network security risks, having an effective security plan has become increasingly critical. The plan must implement strong IT security tools, and there must be a strategy for emerging threats. You and your team can become part of the detection process by making use of the following tips.

Know how to spot phishing emails
Phishing refers to the practice of sending emails that try to induce individuals to reveal personal information, such as passwords and credit card information. Most recently, it is designed to spread Ransomware and other malicious threats. While some phishing emails are extremely easy to spot, others require more due diligence in reviewing the email prior to clicking the links or opening the attachments. You can find out what percentage of your employees is susceptible to phishing attempts with our free phishing security test.

Locate unusual activity on your network
This is a cornerstone to identify a potential cyber threat. Unusual activity includes logging into the system after hours, multiple login attempts, or activity from IP addresses that are overseas. Utilizing a logging tool or network access control can assist in reviewing this activity.

Don’t ignore a slow network or computer
Your users should be able to identify when their systems are not working to the level that they are accustomed. Slow networks or machines can indicate trojans or malware that is working behind the scenes. Review your log files from your firewalls to review the network traffic.

Keep software up-to-date
When developers release updated versions of their software, it often includes a security update. You and your team can help to reduce the likelihood of an attack by ensuring all software programs are up to date.

Run a scan on your network
Even with all of the security tools available today, there is a chance that you may already be compromised. Running a compromise assessment can proactively discover the presence of active or dormant threats that may have evaded your organization’s security defense.

Filed Under: Blog

Three Questions to Ask When Hiring a Cyber Security Consultant

2018/08/06 by Cathy Burnham

cyber security technician in data centerAs a business owner, it’s important to recognize if or when you may lose confidence in your organization’s defenses against cyber attacks. If this sounds familiar, it’s likely time to seek a cyber security consulting service. But how do you know if you’re choosing an organization that is truly qualified? Here are some key questions you should ask when hiring a network security consultant.

What experience does your team have with IT security?
While many cyber security consultants have spent the time to bulk up their resumes with impressing-looking credentials and accreditations, this does not equate to having real-world experience. Rather than what they would do in a potential situation, ask for specifics on what they have done for real clients in the past.

What is my company’s most significant security risk?
By asking this question, you can determine if the consultant is using buzzwords of today’s cyber threats or if they truly understand the risks that your particular organization would be privy to. Each organization is different, and as such, the risks may be different as well.

What communications can I expect during the process?
Some cyber security consulting companies do not want to provide the details of their work, nor discuss with the client baseline results as they progress. Communication is key to ensuring that the consultant is working with your best interest in mind. With a lack of communication, you will likely be disappointed by the results. Rather, ensure that you work with the consultant in providing a statement of work with definitive baselines, as well having them discuss methodologies and procedures. Above all else, remember to ask questions.

Filed Under: Blog

  • « Previous Page
  • 1
  • 2
  • 3

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement