Request a Demo
Cygilant Blog

3 Cybersecurity Trends to Put into Action Today

Posted by Kevin Landt on Sep 23, 2019

As a Security-as-a-Service Agency, we get the benefit of seeing cybersecurity trends across industries. One of the hardest things we see clients tackling is what to focus on. Should you tackle new hacks, the talent crunch, meat and potatoes or the latest technologies?

 

Credit Unions: How to Prepare for the ACET with Security as a Service

Posted by Jeff Pappert on Sep 17, 2019

No doubt every credit union will have heard of the Automated Cybersecurity Examination Tool (ACET). It’s the latest compliance requirement aiming to provide a repeatable, measurable and transparent process that improves and standardizes supervision related to cybersecurity in all federally insured credit unions. A Cybersecurity Agency delivering Security-as-a-Service can help credit unions with the people and repeatable process to meet ACET requirements.

Just Say No to the Latest Cybersecurity Tools, Say Yes to Security as a Service

Posted by Kevin Landt on Jun 10, 2019


As cyber attacks, alerts and patches increase and IT budgets and staff growth stay stagnant, how can you, an SMB IT security professional, keep up?
 

10 Reasons to Consider a Managed Security Service

Posted by Kevin Landt on Jun 10, 2019

There is no doubt that security monitoring is important regardless or company size or industry. According to the respected Verizon 2019 Data Breach Investigations Report, “…we don’t see any industries flying completely under the radar. …everyone is vulnerable to some type of event.” The question is how to implement an effective program. Many companies jump into a project without considering managed security monitoring as an alternative to an in-house SIEM deployment.

Credential Stuffing

Posted by Cygilant on Apr 22, 2019

How to Protect Against Credential Stuffing Attacks

It’s impossible to miss the reports of massive, high-profile data breaches. Adobe, Ancestry, Bitly, Comcast, Dropbox, Equifax, Google+, Marriott Starwood, T-Mobile, Ticketfly, LinkedIn, Yahoo and many other companies have leaked massive amounts of personal information, such as user names and passwords. But you may not be aware of what happens to this data after it’s been stolen.

Cybercriminals often purchase stolen data on the Dark Web. For example, on February 17, 2019, a hacker going by the name Gnosticplayers put eight hacked databases containing data for 92.75 million users on sale for 2.6249 bitcoins (about $9,300) on the Dark Web Marketplace known as Dream Market. Previously, the same hacker had posted a batch of 16 databases containing data for 620 million users and another batch of eight databases with data from 127 million users.

NYDFS - Are You Prepared to Comply with All 4 Phases?

Posted by Cygilant on Apr 1, 2019

How Security-as-a-Service gives you a leg up in developing a comprehensive cybersecurity plan

If you’re one of the thousands of banks, mortgage companies, insurers and other financial service firms that do business in the state of New York, your deadline to complete the final phase of compliance with the New York Department of Financial Services (NYDFS) Cybersecurity Regulation is upon you.  

On March 1, 2019, you are required to ensure that third-parties who access your customers’ private data have security protections in place. This measure comes on the heels of three previous sets of requirements, rolled out in phases beginning in March of 2017, designed to address today’s increasingly sophisticated cybersecurity threats.

Welcoming Rob Scott as CEO!

Posted by Rob Scott on Mar 26, 2019

As you may have heard, earlier today I was officially named as the new CEO of Cygilant [link to press release]. I’m thrilled to be able to finally share this news with you all, and very eager to see what the future holds for the company. 

Despite only being a recent addition, I can already see that there’s something special going on here. Something it feels great to be a part of.

8 Important Factors to Look for in a SOC as a Service Provider

Posted by Lydia Dwyer on Mar 11, 2019

When sourcing SOC as a service, it's important to know what you should expect from the provider. Discover 8 important factors to look for when choosing a SOC as a service provider.

Almost half of CIOs said cybersecurity was a top concern for their organizations in 2018. As threats continue to evolve, it’s unlikely this concern is going to go away in 2019 or beyond.

FFIEC Data Encryption Standards: What You Need to Know!

Posted by Lydia Dwyer on Feb 26, 2019

 

Want to make sure your company is Federal Financial Institutions Examination Council (FFIEC) compliant? Then check out this guide to FFIEC data encryption standards, describing how you can ensure your organization complies with the FFIEC's encryption requirements.

Cybersecurity standards set the minimum requirements to protect your business systems and data. Complying with government and industry data security standards can cost a business millions – and the costs have been increasing in recent years. Concerns about technology and data security are also on the rise, which in turn has led to new rules and new regulations.

How to Use the Microsoft Secure Score – A Step by Step Guide

Posted by Justin Quinn on Feb 12, 2019

Microsoft Security Score is a free security tool that every organization can use to better understand and improve its security position against today’s advanced threats.

In this blog, I’ll provide a step-by-step guide on how to use, and get the most out of, this free tool to improve your organization’s security posture.

Most Recent Posts

Subscribe to Email Updates