Let's Talk
Welcome to the Cygilant Blog

3 Major Benefits of Log Management

Posted by Security Steve on Nov 8, 2016


Log management tools companies better track and understand their data.

Each day IT equipment, servers, firewalls, and other hardware and software systems collect and store information in the form of logs. These logs are vast, and always contain a wealth of data that companies can use to analyze everything from how efficiently they are running their businesses to the state of their IT security.

 

While this information is critical, there's only one problem: It's often hard to decipher because, quite simply, there's just too darn much of it.

That's where log management tools come into play. Here are three major benefits of these tools:

How to Bolster Your IT Security Program

Posted by Security Steve on Feb 23, 2016

With today’s elevated security threat level and related economic impact, it makes sense to do everything you can to secure your organization’s servers, desktops, and devices. How do you keep the bad guys out while securing and enabling day-to-day business? Many companies use SIEM tools for threat detection, compliance, and asset protection. I’d like to suggest a couple of additional layers of security.

 

An effective security program is a balance of people, process, and technology. When evaluating an IT security monitoring solution, it is important to consider each of these areas in the decision-making process. Your organization also needs to determine which areas should be handled internally and which should be co-managed with a trusted partner. Let’s take a look at each:

 

You Don’t Have to Go it Alone

Posted by Security Steve on Feb 3, 2016

There are a lot of things in life we do alone, but if you are like most people, chances are you prefer the company of others, particularly when it comes to doing something that is difficult. It’s often through others that we get the help and guidance we need. For example, we look to Accountants this time of year to help us with the preparation of our taxes. So who is helping you with all of your IT security needs? When you think about everything you need to do, it’s clear that you really need to rely on other people. Let’s consider your to-do list for a minute:

EiQ Networks in The Wall Street Journal

Posted by Shawn O'Brien on Sep 30, 2015

 

Continuous security monitoring has become the new norm for employers as they battle today's growing cyber security threats. Not only do they have to worry about threats from the outside, they have to be concerned about internal risk from employees as well. With so much to do in IT security already, how can employers alleviate some of the burdens? Working with EiQ Networks is an optimal way to resolve your company's IT security concerns because we have the right people, process, and technology in place to make it happen.

Go Block These Open Ports Right Now

Posted by Kevin Landt on Sep 1, 2015


Inbound ports are an open door into an operating system. Leaving them open invites all sorts of visitors - expected or uninvited. The opening of ports is necessary to allow your servers to make client connections, but there are several ports that have no business being left open. These ports are a vulnerability that can be exploited by attackers.

 

What You Should Learn From the Security Mistakes of Big Businesses

Posted by Kevin Landt on Aug 25, 2015

 

What’s bad for Sony Pictures is bad for the world.

 

The last several years have seen titanic companies go down under the malicious attentions of hackers. We’ve taken four of the biggest and discerned a lesson for your company, regardless of its size.

Which Security Threats to Take Action on Now

Posted by Vijay Basani on Aug 20, 2015

Every year sees dozens of lists of top security issues. One major publication will tell you the Internet of Things, cutting edge DDoS attacks, and social media hacks are the top threats. Another will tell you they are nation-state actors, data destruction, and extortion. These were our predictions for this year.

There is little crossover; these lists are subjective by their very nature. That's why a security survey of your company and system is so important—each company has a different threat profile.

To help narrow it down, here are some of the most common threats you will likely face.

6 Reasons You Should Outsource Your Security Monitoring

Posted by Kevin Landt on Aug 18, 2015

 

“Jack of all trades, master of none” is not a figure of speech not everyone relishes having aimed at them. You go out of our way to deepen your skill sets and experience so that you can do things others can’t. In spite of this, many of IT organizations yield to the temptation to keep all security functions in-house despite lacking the time or resources.

 

It's wise to have someone inside your business whose job is to be aware of the security environment and maintain security controls. To freight that person, or small team, with keeping current on every new threat and with measures for their detection, isolation and destruction is asking far too much of both your people and your organizational chart.

3 Network Security Tools Every Business Needs to Know About

Posted by Vijay Basani on Jul 30, 2015

“If you have built castles in the air, your work need not be lost; that is where they should be. Now put the foundations under them.” ―Henry David Thoreau, Walden

 

There is a tendency when it comes to security to either batten down the hatches and take no chances, or pretend you are an exception to the rule that the world is a dangerous place. Given our tendency to fish or cut bait, we run the risk of avoiding the middle way altogether to our detriment. Like diplomacy, there is no end to the security game. Security is not an event, it’s a process.

3 Ways To Detect Threats Once They Invade

Posted by Security Steve on Jul 24, 2015


It’s been over three months since its release, but we’re still fascinated with Verizons Databreach Investigations Report.  In fact, we found the following comment of particular interest. “As far as breach discovery timing, the bad news is that we still can’t catch up to the bad guys.” So the bottom line is that while good defenses can make it hard for an attacker to penetrate a network, a persistent attacker will find a way in. And if that’s the case, how can companies deal with attackers already inside the company network? Here are a few steps that security managers need to consider.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All