Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

New Year’s Cyber Security Resolution

2017/01/26 by admin

Welcome to 2017.

The comment that we have heard most often was thank god 2016 was over;  for those involved in cyber security it was also a banner year for threats – a rapid increase in ransomware, a DDOS attack that was facilitated by IoT devices and the discovery of one of the largest cyber security breaches in history.  With an election that the world watched having an aura of suspicion surrounding nefarious activities that could have decided the outcome, 2017 is shaping up to be a very interesting year.

In 2016 Security professionals had their job cut out for them. They attempted to stop the threats from breaching the perimeter, purchasing and implementing the latest in “next generation” technologies to satisfy a particular threat, such as ransomware – as opposed to looking holistically at the network in its totality.  This piecemeal security implementation, while construed as defense in depth, can also lead to potential vulnerabilities within your network.

Knowledge is Power ….  you cannot protect what you, as an organization, do not know that you have.

The best way to be ahead of the game is to be prepared for threats today, tomorrow and five year from now.  In order to plan your strategy you need to know what you are protecting and from whom you are potentially protecting it from.  Think of it like a football strategy – if you put the strategy in place without know your players or who you are playing against – you will ultimately loose .

Audit and Reporting Image
Audit and Reporting

An internal cyber security threat assessment will provide an organization with valuable information about their network.  The first step in the assessment is to generate a blue print of all of your organizations assets, with key information such as a device IP, host Name, MAC address and operating system.

Once the list is complete, an internal vulnerability assessment will provide the listing of assets that require urgent patches to harden against an attack.

Using the innovative Malware Detection system, the threat assessment will provide a detail of traffic that is communicating to known command and control servers ( C&C),  websites that are outside corporate policy (such as those located in high risk countries), as well during your assessment it will block potential ransomware attacks such as CryptoLocker for Windows and Linux.Encoder.1 for Linux. If compliance is a requirement, complete the assessment for PCI, HIPAA, SOX or ISO 92001.

 

Vulnerability Assessment Image
Vulnerability Assessment

The Cyber Threat Assessment is being offered by Symtrex using the SnoopWall NetShield Network Access Control.  The SnoopWall Netshield is an IntraNet Security product, install for 45 days and run a comprehensive internal network evaluation, which will include asset detection, identify critical vulnerabilities, assist in hardening and managed your trusted assets, detect and block rogue/malicious devices, and audit and enforce compliance & regulatory requirements.

Contact us to find out more or to coorindate your Cyber Threat Assessment

Filed Under: Advanced Persistent Threat, Security News, Snoopwall

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • Cyberattacks Target Websites of German Airports, Admin
  • US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
  • Tenable Launches $25 Million Early-Stage Venture Fund

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement