Let's Talk
Welcome to the Cygilant Blog

Protecting Against Google Docs Phishing Attacks

Posted by James Cote on Oct 5, 2017

Phishing attacks are proving to be more and more effective in recent months, and a frightening new trend has emerged using a highly useful and trusted software as a method of infiltration. Google Documents or “Google Docs” are heavily used in small businesses due to its flexibility and cloud-based storage, however it is frequently being used to trick employees all over the world into infecting their machines with a range of malware and credential stealers. Google Documents has been a very handy tool for several years now allowing multiple people to work on one project at the same time while keeping track of editing. It’s an incredibly powerful tool.

Misconfigured AWS S3 Buckets Continue to Expose Sensitive Data

Posted by Trevan Marden on Sep 8, 2017

DarkNet.org.uk reported earlier this week that information on 4 million Time Warner Cable customers had been exposed in an apparent misconfiguration of an Amazon S3 bucket. You may recall in July it was widely reported that 14 million Verizon customers and 3 million WWE fans had been similarly exposed by a misconfigured S3 instances. Forbes also reported that month that Dow Jones has suffered a similar misconfiguration issue, exposing data on 2 million customers.  In each of these cases, the data leak could easily have been prevented through proper configuration of the S3 buckets. In these cases, simple human error created the security gaps that allowed the leak of sensitive data. In each case the error was found by a third party who observed the issue and reported it to the company.

The True Cost: On-Premise Solutions Versus Cloud Solutions

Posted by Shawn O'Brien on Oct 26, 2016


It's typically more expensive to house a bunch of severs on site than it is to use the cloud.

If you're thinking about transitioning your data from on-premise hardware to the cloud, you're not alone. Many companies are turning to the cloud to support their business operations. For example, in a survey of 930 IT professionals conducted by RightScale, 82% use a hybrid cloud strategy - a 10% increase from 2014.

 

Businesses aren't just using the cloud to increase workplace efficiency and flexibility, they're also using it to protect their most critical asset: data.

EiQ Leverages the Latest Cloud Technology to Lower TCO and Drive Faster Time to Value

Posted by Security Steve on Sep 21, 2016

 

We’ve written recently about the importance of moving your IT security to the cloud and the business benefits of doing so, as well as burst some myths that surround cloud-based security. The fact of the matter is that vendors such as Amazon Web Services provide “a data center and network architecture built to meet the requirements of the most security-sensitive organizations. An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment,” according to the company’s website.

3 Cloud Security Myths

Posted by Shawn O'Brien on Sep 20, 2016

 

Security as a Service has rapidly become one of the hottest cybersecurity trends in 2016. The latest shift in this trend though is the cloud-based options that are available, specifically for the managed IT security services industry. This is primarily due the cost-saving benefits associated with cloud security. Even with this shift, however, there still remains many myths about cloud security. Based on an article by David Spark published on CIO.com called 20 of the Greatest Myths of Cloud Security, EiQ has chosen three of these myths that we believe IT security professionals need to forget about immediately in order to overcome the fear of cloud security and start reaping the benefits.

 

  1. The cloud is fundamentally less secure (in fact it might be safer!)
  2. More breaches occur in the cloud
  3. Maintaining cloud security is just too difficult

Why the Cloud Is Good for IT Security Services

Posted by Shawn O'Brien on Sep 19, 2016


The cloud offers greater IT services than on-premise solutions because it's highly secure.

Can IT professionals rely on the cloud to keep their data safe and secure like they did floppy disks, compact disks and flash drives? After all, for years those units were staple features of business operations and storage. Each of those items proved their worth, but eventually fell in favor to new technology. This time, it's the cloud.

 

"It's not a matter of managing IT security as it is ensuring a breach never happens."

The question today is whether IT professionals can trust the cloud to keep their data secure all the time. Data breaches are a major problem, especially in the banking industry, so it's not a matter of managing IT security as it is ensuring a breach never happens.

BYOD and Cloud Technology Named Top Security Concerns

Posted by Vijay Basani on Apr 22, 2015


A study conducted by IT research company Wisegate found that BYOD practices and cloud technology are the two new threats that make IT departments worry. Out of the hundreds of senior IT professionals surveyed, 51% said that BYOD policies were a top risk for their company. Only 32% of respondents said data breaches and malware were a top security threat. Data breaches and malware are still considered risks that IT professionals are worried about. These data breaches can occur through insecure BYOD policies.

How To Secure Your Cloud

Posted by Security Steve on Jul 14, 2014


Let's face it: the "cloud" is a very hot topic for CIOs, CISOs and CEOs alike.  In recent years, there has been a lot of discussion surrounding the cloud and the benefits of leveraging converged technology for your infrastructure. Between decreased costs and the opportunity for scalable growth, it’s definitely a solution that is smart and appealing to organizations of all sizes. Before jumping into this method of computing, however, companies need to identify suitable ways to keep their sensitive data secure. The cloud can be a safe place for data, but only when proper measures have been put into place to keep it safe. It’s no secret that companies struggle with safety issues when it comes to cloud computing- here are three things to consider including in your cloud security program that will help keep your data breach free.

Big Data and Security Analysis

Posted by Security Steve on Oct 7, 2013


I’m sure you’ve seen this trend, but more and more companies are leveraging big data security tools and technologies by analyzing just about everything. From consumer buying patterns to your competitors’ product strategies - information as power has dawned. Time has revealed how challenging it was for data security experts to take note of the effective complexity of this scope of data before they began applying it directly to improving big data security needs. Today new security products are geared to include big data, which keeps the information in your organization even more secure.

Considerations for a Secure Cloud Environment

Posted by Security Steve on Aug 12, 2013


In recent years, there has been a lot of discussion surrounding the cloud and the benefits of leveraging converged technology for your infrastructure. Between decreased costs and the opportunity for scalable growth, it’s definitely a solution that is smart and appealing to organizations of all sizes. Before jumping into this method of computing, however, companies need to identify suitable ways to keep their sensitive data secure. The cloud can be a safe place for data, but only when proper measures have been put into place to keep it safe. It’s no secret that companies struggle with safety issues when it comes to cloud computing- here are three things to consider including in your cloud security program that will help keep your data breach free.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All