Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Back To Basics

2013/05/21 by admin

It is time to get back to basics, and to really detail out your plan of attack. We invite you to read our ‘Back to Basics – How to Protect your Organizational Assets and Confidential Information. It is provided as a guideline only, however if you do have any questions, or would like some additional information please feel free to contact me directly. Getting_Back_to_Basics

Filed Under: antivirus, byod, Cloud, compliance, endpoint, industry, Log Management, NetClarity, PCI, Products, profile, Security News, Snare, Snare Agents, Unified Threat Management

Nearly two-thirds of organizations are already infected with bots

2013/02/22 by admin

22 February 2013
70% of those infections communicate with their C&C servers at least once every two hours, and more than half of organizations across the globe have had malware downloaded onto their networks via these bots.

This is the shocking result of an analysis by Check Point of 888 public and private organizations worldwide, drawing information from its Check Point ThreatCloud, its global network of threat sensors, and 3D Security Reports conducted at those organizations during 2012. [Read More]

Filed Under: antivirus, industry, NetClarity, Security News

How To Conduct An Effective IT Security Risk Assessment

2013/01/22 by admin

[Excerpted from “How to Conduct an Effective IT Security Risk Assessment,” a new report posted this week on Dark Reading’s Risk Management Tech Center.]

Many security and compliance projects begin with a simple idea: assess the organization’s risk of vulnerabilities and breaches. Indeed, implementing an IT security risk assessment is absolutely critical to the overall security posture of your organization.

An effective security risk assessment can prevent breaches, reduce the impact of realized breaches and keep your company’s name from appearing in the spotlight for all the wrong reasons. Regular IT security risk assessments also enable organizations to build up a cache of historical data that can be used to effectively gauge and communicate monetary impact related to risks -and, hopefully, convince upper management to take decisive action to reduce the organization’s threat surface.

It’s important to note that not every IT security risk assessment is alike — or even remotely close. Indeed, there are many ways to perform IT security risk assessments, and the results may vary widely depending on the method used. It should also be noted that performing a risk assessment is a very small part of the overall risk management process.

[Read More]

Filed Under: Log Management, NetClarity, Security News

  • « Previous Page
  • 1
  • 2

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement