Request a Demo
Welcome to the Cygilant Blog

FFIEC Data Encryption Standards: What You Need to Know!

Posted by Lydia Dwyer on Feb 26, 2019

 

Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.

Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.

How to Use the Microsoft Secure Score – A Step by Step Guide

Posted by Justin Quinn on Feb 12, 2019

Microsoft Security Score is a free security tool that every organization can use to better understand and improve its security position against today’s advanced threats.

In this blog, I’ll provide a step-by-step guide on how to use, and get the most out of, this free tool to improve your organization’s security posture.

Managed SOC: A Beginner's Guide to a Security Operations Center

Posted by Justin Quinn on Jan 9, 2019

In 2018 the average cost of a data breach to an individual company was $3.86 million.

Many small to mid-sized companies wouldn't survive a major breach, but also can't afford to operate a full-scale security operations center (SOC).

The costs, in both physical and human capital, are simply out of their reach.

Thankfully, SOC as a service is now a fully realized and effective way to protect your organization from a cyber attack.

Keep reading to find out how you can benefit from SOC-as-a-Service.

Happy Holidays! 5 Ways to Give Back

Posted by Marissa Wilson on Dec 20, 2018

In mid-December of this year, Cygilant was fortunate enough to participate in a great cause. Our building management team invited every company to participate in a Holiday Gift Drive for Children, through the Massachusetts Department of Children and Families. Once a company elects to participate in the drive and provides the number of employees participating, the building management sends a list of children who, due to circumstances out of their control, do not have any family to provide them gifts during the Holiday season. Each employee is given the child’s age, gift requests in order of need/desire and clothing size. Once the gifts are wrapped and labeled, Cygilant delivered them to the building management team, who will share them with the Social Workers and children.

What Happens if I Fail to Meet FFIEC Guidelines?

Posted by Andrew Igel on Dec 4, 2018

Financial institutions face approximately 85 serious cyber attacks each year. Of these attacks, one-third succeed. While this may not seem like a large number, consider that these threats put people's money at risk each time.

Threats led to the introduction of the Federal Financial Institutions Examination Council (FFIEC). The FFIEC has created security guidelines since 1979. Security risks have changed and increased since the establishment of the guidelines.

That's why the FFIEC examination handbook gets updated regularly. These updates keep up with new risks and changing technology.

4 Things to Look for in a Patch Management Solution

Posted by Trevan Marden on Aug 3, 2018

We’ve seen all too often that the cause of the major breaches we see in the news is failure by the organization to patch a software vulnerability for which a patch has long been available. As a result, more and more organizations are looking for solutions that help make the process of identifying and deploying patches easier and more automated. If you’re looking for a solution for patch management, here are four things to consider:

Should You Switch from SMS-based Two-factor Authentication to U2F Fobs?

Posted by Trevan Marden on Aug 1, 2018

The quick answer is probably yes, wherever you can.

Google recently announced that since deploying physical security fobs to all of its employees, none had been successfully phished on work-related accounts. Google also announced plans to introduce its own hardware fobs – the Titan Security Key, although they look suspiciously identical to those currently offered by Feitian. This may be the endorsement needed to force greater support for the U2F standard which employs a physical fob to generate authentication tokens as a second factor.

AWS Security and Monitoring: What You Need to Know

Posted by Trevan Marden on Jul 27, 2018

Yesterday’s reports showed that Amazon AWS continues to grow rapidly--up almost 50% for the last quarter over the quarter the year before. This reflects the steady move by companies adopting cloud infrastructure to realize cost savings, and particularly companies choosing AWS to deliver these services.

Banks Seeing More Security Incidents than Ever

Posted by Trevan Marden on Jul 25, 2018

Lydia Dwyer on our Product Management team tipped me off to a recent report released by IntSights that revealed that the financial industry is now the most-attacked industry by cybercriminals and that that the volume of security incidents continues to grow. 

4 Questions You Need to Ask About Managed Detection and Response

Posted by Trevan Marden on Jul 23, 2018

Managed detection and response helps solve the needs of organizations who lack resources and enables organizations to better detect and respond to threats. MDR services complement an organization’s own IT or security team to help provide the extra eyes for 24x7 coverage along with security expertise and guidance for remediating potential security incidents that are detected. However, not all services provide the same features. So, it’s important to ask these four questions when looking at managed detection and response solutions.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All