Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Ransomware poses complex legal and reputational risks

2016/04/27 by admin

Brent Arnold and Christopher Oats Contributed to The Globe and Mail

As businesses and public institutions increasingly become the targets of ransomware – malware that blocks access to computer systems or the information they contain until the user performs actions demanded by hackers – legal risks surrounding such headline-making attacks have come to the fore in Canadian corporate consciousness.

A January report by the Online Trust Alliance reveals that ransomware attacks aimed at companies are not only growing more prevalent, but they are also becoming more sophisticated. Today’s hackers can custom tailor their demands according to the size and market value of their corporate mark. Making matters worse, last month Apple’s iOS operating system was infected with ransomware for the first time.

Ransomware typically gains access to a computer system when a user clicks on unfamiliar links or strange attachments (although a growing number of programs are infecting computers via the download of ostensibly legitimate applications). In its most benign form, an infection could force employees to complete a survey; at its most malignant, it has strong-armed companies into paying actual ransoms (typically in the nationless and virtually untraceable currency of bitcoin).

Businesses that fail to comply face the destruction of client and proprietary data, and intellectual property – not to mention sustaining significant reputational damage and exposure to third-party lawsuits from clients and consumers (and there is never any guarantee that meeting hackers’ demands will result in computers or data being unlocked).

Despite this growing threat, legal recourses for ransomware victims are slim. The activity is, of course, illegal and should be immediately reported to police (the RCMP also suggests reporting to the Canadian Anti-Fraud Centre). But despite the fact that such attacks have been reported for more than a decade, there are no documented cases of ransomware perpetrators ever having been prosecuted in Canada.

Given the often remote nature of the crime (the few attacks that have been successfully traced typically come from foreign countries), criminal and civil remedies may be unlikely to succeed. In the rare event that a cybercriminal is identified, civil proceedings against foreign nationals are most likely to result in default judgments that are difficult if not impossible to collect on.

While cybercriminals frequently avoid prosecution, their corporate victims may find themselves in the legal spotlight. Recent amendments to the Personal Information Protection and Electronic Documents Act (PIPEDA) will soon require companies subject to PIPEDA to alert the federal privacy commissioner, affected individuals and relevant organizations or government institutions following a breach of security safeguards that “creates a real risk of significant harm to the individual.” This can include risk of economic loss by the person whose personal information is subject to the breach, as well as potential reputational harms.

While reporting obligations provide an important consumer protection and will be a legal necessity in certain cases (companies that fail to report where required by PIPEDA may be subject to fines of up to $100,000), they are nonetheless problematic for businesses – particularly those for whom data security is a critical component of their brand identity. Recent hacks have shaken consumer and shareholder confidence and resulted in both significant disruption for targeted businesses and resignations by top executives.

All indicators suggest ransomware will only become more vicious and prevalent in the foreseeable future. With added reporting pressure looming on the horizon, companies that fall prey may soon find themselves facing complex legal and reputational risks.

 

Filed Under: antivirus, compliance, CyberThreats, endpoint, industry, Network Monitoring, PCI, Security News, Sophos

SolarWinds Study Reveals Hybrid IT is the Reality

2016/03/29 by admin

MarketWire - News Room - March 29, 2016

SolarWinds Study Reveals Hybrid IT is the Reality for Majority of Businesses; Security Concerns, New Skillsets Top of Mind for IT Professionals

According to the SolarWinds IT Trends Report 2016, Only 9 Percent of IT Professionals Say Their Organizations Have Not Migrated Any Infrastructure to the Cloud, While 62 Percent Report Security Remains the Greatest Challenge and Three-Quarters Indicate Resources and New Skills Are Still Needed

AUSTIN, TX-(Marketwired - March 29, 2016) - SolarWinds, a leading provider of powerful and affordable IT management software, today released the findings of its IT Trends Report 2016: The Hybrid IT Evolution. The study features insights from IT practitioners, managers and directors proving that the vast majority of businesses have shifted away from on-premises-only infrastructure to hybrid IT environments, creating new concerns and pressures for IT professionals.

“The findings of this year’s study paint a clear picture: cloud adoption is nearly ubiquitous, but it’s not now and will not in the foreseeable future be suitable for all workloads, and even if it were, very few if any companies would convert all of their existing applications to run in the cloud,” said Joel Dolisy, CIO, SolarWinds. “The resulting dynamic — one set of critical on-premises services connected with another set of services in the cloud — is hybrid IT. And at the center of this evolution is the IT professional who needs to ensure always-on performance of applications, devices, networks and systems — regardless of location. They need to be empowered with the support to gain the skills and tools required to properly monitor and manage hybrid IT environments, which in turn will allow businesses to truly unlock the potential of the cloud.”

Download the Solarwinds IT Trends Report 2016: the Hybrid IT Evolution

Read the article

Contact us for more information at 866-431-8972 or via email at [email protected]

Filed Under: Advanced Persistent Threat, Cloud, compliance, CyberThreats, endpoint, industry, Network Monitoring, PCI, Security News, SolarWinds

Solarwinds honoured - Network & Security Product Excellence

2016/03/23 by admin

AUSTIN, TX -(Marketwired - March 23, 2016) - SolarWinds, a leading provider of powerful and affordable IT management software, today announced several industry accolades for its network and security management products from respected industry publications including, SC Magazine®, Cyber Defense Magazine, Network Computing® and CRN®.

“At SolarWinds, we are proud to provide IT professionals with robust products that equip them with deep visibility and reliable data to help tackle the monitoring and management challenges they are confronting in their environments,” said Nikki Jennings, group vice president, product strategy, SolarWinds. “Receiving these product awards is affirmation that we are listening to our users, taking the time to understand the problems they are facing, and dedicating our time to providing the products they need to solve all their IT problems.”

Network Management

  • SolarWinds® Network Configuration Manager won for “Best Risk/Policy Management Solution” in the 2015 SC Awards U.S.
  • SolarWinds Network Performance Monitor was a finalist for “Network Management Product of the Year” in the 2016 Network Computing UK Awards
  • SolarWinds was a finalist for “Company of the Year” in the 2016 Network Computing UK Awards

Security Management

  • SolarWinds Log & Event Manager won for “Best Product — Security Information Event Management (SIEM)” in the 2016 Cyber Defense Awards
  • SolarWinds was named the “Hot Company — Patch & Configuration Management” for SolarWinds Patch Manager in the 2016 Cyber Defense Awards
  • SolarWinds was named one of the “20 Coolest SIEM and Threat Detection Vendors” in CRN‘s 2016 Security 100
  • SolarWinds Log & Event Manager is a finalist for “Best SIEM Solution” in the 2016 SC Magazine Awards Europe; winners to be announced June 7

To find out more about Solarwinds give us a call at 866-431-8972, send us an email at [email protected],

Filed Under: compliance, CyberThreats, industry, Log Management, Network Monitoring, Products, Security News, SolarWinds

Solarwinds Positioned Highest in Ability to Execute

2016/03/03 by admin

Gartner 2016 Magic Quadrant Positions SolarWinds Highest in “Ability to Execute” for Network Performance Monitoring and Diagnostics

AUSTIN, TX-(Marketwired - March 02, 2016) - SolarWinds, a leading provider of powerful and affordable hybrid IT infrastructure management software, today announced that the company has been included in the Gartner, Inc. 2016 Magic Quadrant® for Network Performance Monitoring and Diagnostics (NPMD)* as a Challenger. In addition, the report positions SolarWinds highest along the “Ability to Execute” axis.

“We believe our position in the Gartner® NPMD Magic Quadrant is reflective of our commitment to eliminating the complexity that IT professionals face in their environments today,” said Nikki Jennings, group vice president, product strategy, SolarWinds. “By developing powerful solutions that address real-world problems out of the box with no professional services required, SolarWinds provides accessible and immediate value to help IT Pros reach their most-pressing network infrastructure health and performance goals that drive the business forward.”

According to Gartner, “The goal of NPMD products is not only to monitor the network traffic and infrastructure to facilitate outage and degradation resolution, but also to identify performance optimization opportunities.”

As part of its research, Gartner tested SolarWinds’ NPMD offering featuring Network Performance Monitor and NetFlow Traffic Analyzer.

SolarWinds Network Performance Monitor provides a comprehensive view of network fault, performance, availability, and latency to more effectively identify, prioritize and resolve network issues before they impact application performance, end users and businesses.

SolarWinds NetFlow Traffic Analyzer provides a platform to aggregate and analyze all flow data, including NetFlow, J-Flow, sFlow®, IPFIX, and NetStream® data, enabling IT Pros to keep a close watch on network traffic data, identify bandwidth hogs and build customized reports of network traffic.

Contact us for more information

Filed Under: CyberThreats, Network Monitoring, Products, SolarWinds

3 ways SMBs can become more cyber resilient

2016/03/02 by admin

With companies facing more risk of attacks, it’s vital to step up endpoint and network security

By Todd Weller, Special to ThirdCertainty - Vice President of Corporate Development at Hexis Cyber Solutions

Cyber attackers don’t discriminate based on company size. They focus on the value of the data they can steal. This means that most small and midsize businesses face much the same cyber exposures as large enterprises.

But due to cash flow and manpower constraints, SMBs face greater challenges when it comes to securing their networks. Unfortunately, attackers aren’t sympathetic and these challenges may result in SMBs being viewed as more attractive targets.

Based on the data breaches disclosed in 2014 and 2015, it is clear that cyber attacks have become a mainstream operational risk for all companies.

That said, there is no reason 2016 shouldn’t be a year in which companies, especially SMBs, make progress toward achieving cyber resilience. This should be a key objective for organizations of all sizes.

Cyber resilience requires organizations to have plans in place to prevent, detect, respond and recover rapidly from cyber attacks. In short, cyber attacks are now a business and operational risk and no longer just an IT risk.

The good news for SMBs is that steady improvement of the company’s security posture does not have to be an overwhelming endeavor. Here are three steps to put you on a path to become more cyber resilient in 2016:

Improve visibility. Relying on detection technologies focused primarily on known threats no longer provides sufficient visibility. Detecting advanced threats requires deployment of behavior-based detection capabilities on both endpoints and networks. Continuous recording capabilities (analogous to a security camera) can be used reactively and proactively.

Focus on integration. Some large organizations deploy solutions from hundreds of security vendors. SMBs with limited resources do not have that option. Fortunately, many cybersecurity vendors are moving toward integration of multiple detection capabilities. There is a growing trend of a provider offering both endpoint and network capabilities.

Look into managed services. Monitoring and effectively responding to thousands of alerts can be daunting. This is why many SMBs are looking to consume security monitoring and response as a managed service. The good news for SMBs is that by going to a managed security services provider, they not only get access to a nice car, but also get a driver with it.

 

Filed Under: compliance, CyberThreats, endpoint, Hexis, Network Monitoring, Products, Security News

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next Page »

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement