Request a Demo
Cygilant Blog

How a Security Breach Hurts Your Businesses' Bottom Line

Posted by Shawn O'Brien on Oct 24, 2016

Security breaches can greatly impact your company's bottom line.

As a business owner, you need to take IT security seriously. Not doing so threatens your company's bottom line due to lost customers and revenue - and possibly top officials if they lose their jobs, which can destabilize departments.


As proof IT security can cost your company a bundle of money, let's first examine data regarding how customers feel about and act towards companies that have been breached.

Breaking Down Yahoo IT Breach of 500 Million User Accounts

Posted by Shawn O'Brien on Oct 11, 2016

500 million Yahoo accounts were breached and possibly stolen in 2014.

IT security is a growing issue that companies must address before it's too late. For example, take Yahoo, which recently experienced what some are calling the biggest breach of all time, when cybercriminals stole information from 500 million user accounts.


"Yahoo believes that criminals stole an assortment of personal information."

Confirmed by Bob Lord of Cisco in a statement, Yahoo believes criminals stole an assortment of personal information from users, although it suggests unprotected passwords, bank account information and payment card data were left untouched.

Data Breach Details: Eddie Bauer Stores

Posted by Vijay Basani on Sep 23, 2016

Eddie Bauer's stores were recently breached by cybercriminals.

Protecting critical business data and customer information should not be taken lightly. The latest example of a major data breach comes out of Eddie Bauer, a clothing store chain located in Washington.


"Not every Eddie Bauer

customer was affected by the breach, but all would receive identity protection."

The company recently released a statement notifying its customers that its North American stores had been compromised by a security hack between January 2 and July 17 of this year. It did note that not every customer was affected, but that all customers would receive identity protection for 12 months.

Healthcare Organizations Are Under Cyber Attack

Posted by Shawn O'Brien on Aug 23, 2016

The healthcare industry just keeps getting hammered by cybercriminals in 2016. The reality for healthcare organizations is that cyber attacks are now part of their everyday business and that the best option is to improve their cyber defenses in order to better protect themselves.


According to the third annual Experian 2016 Data Breach Industry Forecast report, 91% of all healthcare organizations reported at least one data breach in the last two years. What makes them such prime targets is the price of the valuable information they have. According to this same report, “medical records are worth up to 10 times more than credit card numbers on the black market.”

Data Breach Alert: Yahoo Struck by Hacker “Peace” – 200 Million Accounts Affected

Posted by Shawn O'Brien on Aug 17, 2016

Another big name gets added to the list of 2016 data breaches. Yahoo, the multinational technology company, has its hands full as it deals with trying to confirm the possibility of a data breach. The infamous hacker that goes by the tag of “Peace” has listed a cache of what allegedly appears to be 200 million stolen Yahoo user accounts for sale on the Dark Web. Yahoo has already begun a thorough forensic analysis investigation to the determine the validity of the hacker’s claims and promises that it’s taking this breach "very seriously.” According to reports by Motherboard, the cache supposedly contains usernames, passwords, and dates of birth. At this time, the stolen user data is currently being sold for 3 Bitcoins, or around $1,860, and apparently contains records from “2012 most likely,” according to hacker Peace. Peace has also provided a way to unscramble the hashed credentials, making it easier for buyers to use the stolen information once they get their hands on it.

Breach vs. Hack—The Differences You Need to Know to Protect Your Company

Posted by Kevin Landt on Aug 1, 2016

In conversations about digital compromises, the terms “breach” and “hack” are often used interchangeably—but the two are actually quite different. In short, a hack involves a malicious actor or actors gaining unauthorized access to a protected computer, whereas a breach is a broader category indicating any spill of confidential data, including those that happen by accident. Here's some more detail on what makes them different, and how prevention strategies differ between the two.

Is Remote Access Worth the Cybersecurity Risk? Assessing TeamViewer's Breach

Posted by Security Steve on Jul 22, 2016


Telecommuting has never been more common, and as it increases in prevalence, cybersecurity risks will follow. This has been most recently illustrated by the complications plaguing TeamViewer, a popular proprietary piece of software for establishing remote access between computers.

Data Breach Alert: Stuck Between a Hard Rock and a Hard Place

Posted by Shawn O'Brien on Jul 14, 2016


The number of data breaches in 2016 list keeps growing! To make matters worse, if suffering from one data breach wasn’t bad enough, Hard Rock Hotel & Casino in Las Vegas, Nevada, announced that it recently suffered from a second data breach in just over a year.

Social Media and the Rise of Cybercrime: A Security Timeline

Posted by Kevin Landt on Jul 11, 2016


Social media gets blamed for a lot of things: spreading gossip, fostering hysteria, targeting fraud victims, catfishing, and even burglary. Some of those risks have been overstated, even sensationalized, but all of those social media-related crimes have occurred. Of more direct concern for business is the undeniable connection between the rise of social media and cybercrime.

Just How Big Was the Wendy’s Data Beach?

Posted by Shawn O'Brien on Jul 8, 2016


The global fast food business brings in $570 billion a year. It's ubiquitous, woven into the very fabric of American life. It defines American abundance and efficiency across the globe—and it is a favorite target of cyber attacks.

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Recent Posts

Posts by Topic

See All