67% of senior tech executives admit their organization has experienced a security breach in the past 12 months. (But 41% did not report the incident to authorities.) — BusinessWeek from Pricewaterhouse Coopers/ CIO Magazine study
In 2004, the average time between public disclosure of a vulnerability and the release of exploit software was 5.8 days -- Internet Security Threat Report
Half of all computer crashes reported by its customers are caused by spyware and its equivalents. - Microsoft
90 percent of all personal computers could be infected with at least one form of spyware. - National Cyber Security Alliance
There was a 400% increase in the number of Win32 viruses and worms released in the first half of 2004 -- Symantec
At ClearPath Security, we believe in providing a complete solution, not merely selling point products. To that end, we would like to be your partner in delivering the most secure and robust network possible to your employees and customers.
We are the
"No Hardware - No Software Agenda"
Allow us to sit down with you and offer our expertise. Together, we can devise a plan that will be unique to your needs. The consultation is free, the benefits are immeasurable.
ClearPath engineers are available for short and long term projects within the Front Range area as well as remotely via remote administration solutions.
Some of the areas that we can assist organizations in are:
Network security assessments
Security policy creation
End-user security awareness training
Network audits and penetration studies
Hardware / Software inventory
Web and Email solutions
Malicious software removal
Remote access solutions (Terminal Services, Citrix)
Hardware and software troubleshooting
New server/network integration and deployment
Co-located server support
Disaster Recovery Planning
Wireless site survey and implementation
Regulatory compliance (GLBA, HIPAA, SOX)
Whether you have an extensive RFP, or need assistance detailing your needs, please offer us the opportunity to address your needs. Our consultants are available to serve you.
| Network Security Best Practices|
Turn off and remove unneeded services
ALWAYS keep your patch levels up to date, especially on systems that face the Internet and are accessible through the firewall, such as HTTP, FTP, Mail and DNS services
Enforce a password policy as part of an overall Internet Use policy
Keep antivirus definitions up to date
Isolate infected computers quickly to prevent further compromise
Start an employee network security training program
Scan all Internet downloads for viruses with an updated antivirus scanner
Ensure emergency response procedures are in place
Configure your email server or firewall to remove or block file attachments that are commonly used to spread viruses such as: .vbs, .bat, .exe, .pif and .scr
Audit systems regularly to ensure adequate controls are in place