Let's Talk
Welcome to the Cygilant Blog

Why a Cybersecurity Plan Should Be In Your 2017 Budget

Posted by Shawn O'Brien on Dec 28, 2016


Cybersecurity simply demands a portion of your yearly budget.

When planning out a budget for the new year, finding a place for cybersecurity can be difficult. You want to put that money toward new ventures, but you also know that a major breach can forever damage your reputation. 

To help those waffling between how much to put into digital defenses, let's review some of the biggest reasons having a plan is worth the time and money.

 

Effective Methods to Reduce Uncertainty Over Cyber Threats

Posted by Kevin Landt on Nov 22, 2016


If you're concerned about IT security threats, you should take measures to protect your company.

Are you worrying about an IT breach more than your company's sales numbers? In some sense, that's a good thing (IT security should be at the top of your list). But on the flip side, it shouldn't be keeping your organization's C-Suite executives up at night.

If IT security problems are becoming a headache, you probably need to do more to protect your company from cyber attacks.

Here are two effective methods to help you reduce your uncertainty about cyber threats.

How a Security Breach Hurts Your Businesses' Bottom Line

Posted by Shawn O'Brien on Oct 24, 2016


Security breaches can greatly impact your company's bottom line.

As a business owner, you need to take IT security seriously. Not doing so threatens your company's bottom line due to lost customers and revenue - and possibly top officials if they lose their jobs, which can destabilize departments.

 

As proof IT security can cost your company a bundle of money, let's first examine data regarding how customers feel about and act towards companies that have been breached.

How Credit Unions Mitigate Risks in the Digital World

Posted by Security Steve on Oct 12, 2016


Credit unions need to be protect themselves from cybercriminals.

Smaller financial instiutions, such as credit unions, need to keep their systems well-protected from cybercriminals, whether they're insiders or those operating from outside of the organizations. To do so, credit unions must first understand just how important IT security is. They must also come to terms with how their IT security capabilities are likely more limited than larger firms with more spending capital. When they accomplish both, they can take the appropriate measures to protect themselves.

How to Craft an Effective Data Security Plan

Posted by Security Steve on Aug 2, 2016

A data security plan is an organization's framework for employing security tools to make sure digital information is accurate, reliable, and available when those with authorized access need it—and not those without authorized access, such as malicious hackers. There are a few basic steps involved in assembling a quality data security plan:

Are These 3 Cybersecurity Risks Keeping You Up at Night?

Posted by Shawn O'Brien on Jul 25, 2016

 

Companies stand to lose a lot if they are hacked. They risk lawsuits, loss of brand equity, theft of intellectual property, and more. Among other dangers, there are three especially common cybersecurity threats that may bring this nightmare to life for any organization and can haunt those charged with protecting the company if they don't have the resources to do so. Those threats are ransomware, insiders, and vulnerability hacks—and here's what IT teams can take to defend against them.

Is Remote Access Worth the Cybersecurity Risk? Assessing TeamViewer's Breach

Posted by Security Steve on Jul 22, 2016

 

Telecommuting has never been more common, and as it increases in prevalence, cybersecurity risks will follow. This has been most recently illustrated by the complications plaguing TeamViewer, a popular proprietary piece of software for establishing remote access between computers.

Manage Risk by Managing Your Organization’s Vulnerabilities

Posted by Security Steve on Jul 6, 2016

In a recent article on Credit Union Journal, I wrote about how to go beyond risk management to assess vulnerabilities in order to secure your data. It’s important to understand that vulnerability and risk are not the same thing. Risk is the probability of the vulnerability being exploited multiplied by the cost of damage it will cause. This is required for risk evaluation and will help you focus your remediation efforts as well as define compliance boundaries. Vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities especially in software and firmware. It works by analyzing computer systems for known vulnerabilities such as open ports, insecure software configuration, susceptibility to malware, etc.

How Are You Implementing SANS/CIS Controls to Mitigate Risk of Data Breach?

Posted by Security Steve on Mar 2, 2016

 

Many regulations state that companies must take reasonable measures to protect sensitive data, for example, personal information such as Social Security numbers, medical information, and payment card data. But even with that mandate, information is still being stolen through data breaches. Last year in the state of California, 178 reported breaches put over 24 million records at risk, affecting nearly 60% of Californians.

 

How to Set Up a Threat Assessment Program

Posted by Security Steve on Sep 28, 2015

Simple products such as firewalls used to be enough to raise the alarm when something untoward was happening to your computer or network. With the extraordinary level of technology available to hackers and the increasing sophistication of the hackers themselves, it's no longer sufficient to slap an off-the-shelf security product into place and call it a day.

Now, you need to have a threat assessment program in place.

Here are a few tips on getting started.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All