Challenge: The agency’s mission is to protect the people and the environment. As such, the agency must ensure the confidentiality, integrity and availability of sensitive IT systems that help the agency achieve this goal. Solution: Symposit provides expert level Systems, Network and Cybersecurity engineering services for the agency’s sensitive IT systems. These services include systems/network
If you’re a thief, would you rather bust through the front door, or quietly slip in the back and be in and out quietly and stealthily? Many cyber adversaries prefer this approach to stay undetected and keep a low profile. While the recent WannaCry ransomware attack was highly publicized, another lesser known malware called Adylkuzz has been
ALEXANDRIA, VA – Symposit LLC donates to Glasgow Middle School Success Prep Program. The donation was used to fund a field trip so that students in the success prep program could attend University of Mary Washington (UMW). At UMW, Glasgow students toured the beautiful campus. They visited a classroom, got to check out a dorm, perused
Symposit LLC founder Bobby Bermudez was featured on Engineering@Syracuse’s Blog! Article is below and original article can be found here March 07, 2017 The cybersecurity battlefield is evolving rapidly, so analyzing threats from the last year can help experts anticipate trends that may emerge in coming months. Here’s a cybersecurity forecast for 2017: Securing the Internet
ALEXANDRIA, VA – The U.S. Small Business Administration announced that Symposit LLC, a professional services IT & cyber-security consulting firm, has received the 8(a) Business Development program certification for a term of 9 years. The certification enables Symposit LLC to receive business development assistance and guidance from the SBA, as well as participation in open competition
The Federal Trade Commission has some advice about what consumers should do after a data breach…ehhh Yahoo, we are looking at you! More info at identitytheft.gov/databreach
I’d like to talk about something very important with regards to computer security, and really computing in general. Computers are indeed complex machines, with many layers of working components working in tandem to present you with a useful and useable experience. Each one of the aforementioned “components” is a potential attack vector for an attacker.
How many times a day do you give out your email address, inadvertently or voluntarily? How many lists do you think your email address appears on? Can you trust every vendor you register with? I know I would have a tough time answering these questions. Of course, I tend to be a rather private person
One of my favorite web comics, XKCD explains password strength…
You’ve heard it before, but I’ll say it here again. The web, including your data, is under constant attack. Everywhere and all the time. Some of the attacks are automated and come from “robots,” while others are actual humans trying to break in. Failing to utilize two-factor authentication, whereever and whenever possible, will leave you exposed.