Cygilant Blog

Don’t Be the Victim of Ransomware!

Posted by Security Steve on Apr 5, 2016

With the advent of ever more sophisticated ransomware cyber attacks, you can’t be too careful these days. In the past, ransomware was largely spread by phishing attacks -- and employee education about not clicking external links or images was helpful in mitigating any potential problems. At the same time, the attack typically would encrypt just files, not whole systems. Now, ransomware attacks are locking down entire file systems, making machines (and even whole networks) completely unusable.

 

The Threat Landscape in 2016: 3 Reasons to Revise Your Cybersecurity Plan

Posted by Kevin Landt on Apr 4, 2016

 

The threat landscape is constantly becoming more sophisticated. That means any cybersecurity strategy not up to date with security tools and research will leave an organization open to attacks. According to a 2016 IBM report, only 17% of the participating organizations are fully “cybersecured”—which means 83% are inadequately defended.

 

To be prepared, companies need to implement cybersecurity strategies that address today's threats. The following three examples of emerging attacks show why all but the most well-guarded companies' current cybersecurity strategies need an update.

4 Cybersecurity Trends We Expect to See In 2016

Posted by Vijay Basani on Feb 4, 2016

 

2016 is a new frontier for cybersecurity, but based on what happened in 2015, it’s safe to say that past incidents will continue this year. Here are four cybersecurity trends we expect to see in 2016:

The Growing Threat of Ransomware

Ransomware encrypts data on user machines to prevent access until the user pays to release the encryption. In other words, ransomware holds user data hostage and demands a ransom to free it. These attacks are becoming more and more common, even extorting money from police departments. Ransomware can affect both ordinary computers and phones—and it won’t be long until Internet of Things devices face the same alarming consequences.

In an Era of Cyber Threats, How Can You Tell the Wheat From the Chaff?

Posted by Vijay Basani on Jul 9, 2015

News and noise aren’t mutually exclusive, so let’s look at the bottom line.

If you go by what’s featured in the news or in your Twitter feed, you are liable to believe the greatest threats to your company’s web properties and digital intelligence are the hacking collective Anonymous and the country of China. In fact, those are distractors to the real issues you should be keeping an eye on.

We live in an era saturated with online threats. No online threat should be disregarded out of hand, but businesses have to prioritize or they’d either never get anything done, or they’d burn through their money in no time.

EiQ’s security monitoring technology and managed services help you rank and eliminate these threats, but no tool works quite as well as when it’s wielded by an informed user. Here are the three main threats we believe you should train yourself to recognize.

Most Recent Posts

Subscribe to Email Updates