Let's Talk
Welcome to the Cygilant Blog

Kevin Landt

Recent Posts

MDR vs. MSSP vs. Security as a Service

Posted by Kevin Landt on Jul 17, 2017

Managed Detection & Response, or MDR, has been generating some buzz in the security industry. Last year, Gartner created a separate category for MDR and started selling research papers. Vendors took notice and started marketing their services as MDR offerings. What does all of this mean to you?

Effective Methods to Reduce Uncertainty Over Cyber Threats

Posted by Kevin Landt on Nov 22, 2016


If you're concerned about IT security threats, you should take measures to protect your company.

Are you worrying about an IT breach more than your company's sales numbers? In some sense, that's a good thing (IT security should be at the top of your list). But on the flip side, it shouldn't be keeping your organization's C-Suite executives up at night.

If IT security problems are becoming a headache, you probably need to do more to protect your company from cyber attacks.

Here are two effective methods to help you reduce your uncertainty about cyber threats.

3 Things About Cybersecurity Your Boss Wants to Know

Posted by Kevin Landt on Oct 25, 2016


Are CEOs aware of cybersecurity best practices? They should be.

Managers are versatile employees who understand how to run departments and motivate employees, but they may not always be the most well informed about cybersecurity. However, this isn't their fault!

 

The landscape of cybersecurity changes every day, and IT professionals must always stay on their toes to protect networks against new, advanced phishing and malware attacks. After all, cybercriminals are always on the lookout for new holes and weakness to exploit. Department managers simply don't have the time to run teams and IT security practices. 

 

IT professionals need to keep management well informed about new IT security protocols, updates, possible breaches, and actual attacks. In more detail, here are three things your boss wants to (or should know) about cybersecurity:

3 Signs You Should Invest in Cybersecurity

Posted by Kevin Landt on Oct 6, 2016

Cybercriminals and IT security shouldn't be taken lightly. One breach can cost your company hundreds of thousands of dollars. If you're not sure whether your company needs to upgrade or completely revamp its cybersecurity practices, here are three warning signs that indicate it should:

 

"One breach can cost your company hundreds or thousands of dollars."

1. You Don't Understand the Target

IBM executive security advisor Diana Kelley, who co-authored the IBM study "Securing the C-suite," has over two decades of cybersecurity experience. Her company has 7,000 IT professionals protecting the organization from outside threats. But even Kelley recognizes that numerous executives, even at the most influential computer institutions such as IBM, don't take IT security as seriously as they should.

Best Practices: Security Monitoring for Credit Unions

Posted by Kevin Landt on Sep 22, 2016


Credit unions must always be on the lookout for potential breaches.

The threat from cybercriminals is real, and credit unions must be on the constant lookout for potential breaches. These institutions are very vulnerable to cyber attacks because of their smaller size, and don't always have the IT infrastructure and resources to thwart cyber attacks like their larger counterparts, according to a new 2016 Beazley Breach Response Insights report.

 

"You're being tested every day, whether you realize it or not," said David Luchtel, Vice President of IT Infrastructure and Operations at WSECU, according to Credit Union Times.

3 Global Cybersecurity Standards Every Professional Should Know

Posted by Kevin Landt on Aug 16, 2016

 

Cybersecurity standards are sets of best practices for protecting organizations from cyber attacks. There are many groups across the world that establish and promulgate their recommended cybersecurity standards. These range from nondecision-making bodies of experts sharing information to treaty-based governmental associations.

 

The various frameworks each have their own advantages and disadvantages. Starting with the familiar U.S. federal government's approach and then moving on to other standards around the globe, the following introduces three cybersecurity standards or approaches to standards and why they matter for small- to medium-sized businesses.

Breach vs. Hack—The Differences You Need to Know to Protect Your Company

Posted by Kevin Landt on Aug 1, 2016

In conversations about digital compromises, the terms “breach” and “hack” are often used interchangeably—but the two are actually quite different. In short, a hack involves a malicious actor or actors gaining unauthorized access to a protected computer, whereas a breach is a broader category indicating any spill of confidential data, including those that happen by accident. Here's some more detail on what makes them different, and how prevention strategies differ between the two.

Are Cybercriminals Accessing Your Email Account?

Posted by Kevin Landt on Jul 19, 2016

 

In May 2016, when security researchers announced the discovery of one of the largest email hacks in history, with a total of over 200 million email records compromised, people (unsurprisingly) panicked. The breach claimed to have affected close to 57 million Mail.ru accounts; tens of millions of Gmail, Microsoft, and Yahoo accounts; and hundreds of thousands of accounts held with German and Chinese providers.

Social Media and the Rise of Cybercrime: A Security Timeline

Posted by Kevin Landt on Jul 11, 2016

 
 

Social media gets blamed for a lot of things: spreading gossip, fostering hysteria, targeting fraud victims, catfishing, and even burglary. Some of those risks have been overstated, even sensationalized, but all of those social media-related crimes have occurred. Of more direct concern for business is the undeniable connection between the rise of social media and cybercrime.

Spearphishing and Whaling: How Email Verification Can Save Companies Millions

Posted by Kevin Landt on Jul 1, 2016

 

Phishing attacks, a topic EiQ has previously discussed, remain one of the chief causes of data breaches. Even small businesses find themselves on the receiving end of these scam emails, which are designed to trick readers into taking actions that compromise their cybersecurity. Spearphishing and whaling accomplish the same ends with even more devious and targeted tactics. Here's how they work, and how you can protect yourself and your business.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All