Loading...

Follow EiQ Networks Blog on Feedspot

Continue with Google
Continue with Facebook
or

Valid

As cyber attacks, alerts and patches increase, IT budgets and staff growth stay stagnant, how can IT security professionals at SMBs keep up?
 
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

There is no doubt that security monitoring is important regardless or company size or industry. According to the respected Verizon 2019 Data Breach Investigations Report, “…we don’t see any industries flying completely under the radar. …everyone is vulnerable to some type of event.” The question is how to implement an effective program. Many companies jump into a project without considering managed security monitoring as an alternative to an in-house SIEM deployment.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
EiQ Networks Blog by Cygilant - 3M ago
How to Protect Against Credential Stuffing Attacks

It’s impossible to miss the reports of massive, high-profile data breaches. Adobe, Ancestry, Bitly, Comcast, Dropbox, Equifax, Google+, Marriott Starwood, T-Mobile, Ticketfly, LinkedIn, Yahoo and many other companies have leaked massive amounts of personal information, such as user names and passwords. But you may not be aware of what happens to this data after it’s been stolen.

Cybercriminals often purchase stolen data on the Dark Web. For example, on February 17, 2019, a hacker going by the name Gnosticplayers put eight hacked databases containing data for 92.75 million users on sale for 2.6249 bitcoins (about $9,300) on the Dark Web Marketplace known as Dream Market. Previously, the same hacker had posted a batch of 16 databases containing data for 620 million users and another batch of eight databases with data from 127 million users.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
How Security-as-a-Service gives you a leg up in developing a comprehensive cybersecurity plan

If you’re one of the thousands of banks, mortgage companies, insurers and other financial service firms that do business in the state of New York, your deadline to complete the final phase of compliance with the New York Department of Financial Services (NYDFS) Cybersecurity Regulation is upon you.  

On March 1, 2019, you are required to ensure that third-parties who access your customers’ private data have security protections in place. This measure comes on the heels of three previous sets of requirements, rolled out in phases beginning in March of 2017, designed to address today’s increasingly sophisticated cybersecurity threats.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As you may have heard, earlier today I was officially named as the new CEO of Cygilant [link to press release]. I’m thrilled to be able to finally share this news with you all, and very eager to see what the future holds for the company. 

Despite only being a recent addition, I can already see that there’s something special going on here. Something it feels great to be a part of.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When sourcing SOC as a service, it's important to know what you should expect from the provider. Discover 8 important factors to look for when choosing a SOC as a service provider.

Almost half of CIOs said cybersecurity was a top concern for their organizations in 2018. As threats continue to evolve, it’s unlikely this concern is going to go away in 2019 or beyond.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.

Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Microsoft Security Score is a free security tool that every organization can use to better understand and improve its security position against today’s advanced threats.

In this blog, I’ll provide a step-by-step guide on how to use, and get the most out of, this free tool to improve your organization’s security posture.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In 2018 the average cost of a data breach to an individual company was $3.86 million.

Many small to mid-sized companies wouldn't survive a major breach, but also can't afford to operate a full-scale security operations center (SOC).

The costs, in both physical and human capital, are simply out of their reach.

Thankfully, SOC as a service is now a fully realized and effective way to protect your organization from a cyber attack.

Keep reading to find out how you can benefit from SOC-as-a-Service.

  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
EiQ Networks Blog by Marissa Wilson - 7M ago

In mid-December of this year, Cygilant was fortunate enough to participate in a great cause. Our building management team invited every company to participate in a Holiday Gift Drive for Children, through the Massachusetts Department of Children and Families. Once a company elects to participate in the drive and provides the number of employees participating, the building management sends a list of children who, due to circumstances out of their control, do not have any family to provide them gifts during the Holiday season. Each employee is given the child’s age, gift requests in order of need/desire and clothing size. Once the gifts are wrapped and labeled, Cygilant delivered them to the building management team, who will share them with the Social Workers and children.

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview