Cygilant Blog

Selling the Need for Security: Getting Buy-In from Your Team

Posted by Security Steve on Apr 22, 2016


When it comes to cybersecurity, most executives are unprepared for cyber attacks. But often, IT professionals need to convince these individuals of the importance of network security monitoring. There is no one ideal way to persuade decision-makers to invest in quality security tools, but here are three effective methods to consider.

What to Consider When Choosing an Information Security Partner in Today's Threat Landscape

Posted by Robert Porzio on Mar 21, 2016

Due to extreme changes in the state of the Internet, commerce, and customer expectations, the way that mid-market organizations are utilizing technology has greatly evolved. Today’s ever-shifting and increasingly complex threat landscape has made this rapid evolution even more difficult as SMEs continue to accumulate proprietary, customer, and employee data. 

The 5 Stages of a Data Breach (and How You Can Protect Your Company)

Posted by Security Steve on Feb 29, 2016


We’re growing more aware of data breaches, but our understanding of how they work hasn’t kept pace with the increasing rate of cyber attacks. In fact, they've become so common that one in three Americans have had their health records compromised in 2015. Cybersecurity education is necessary in preventing future hacks; here's a breakdown of the five stages of a data breach—and what solutions SMEs can use to protect themselves.

3 Critical Steps SMEs Should Take to Protect Their Customers' Private Data

Posted by Vijay Basani on Feb 25, 2016


Headlines generally focus on hacks of large corporations, but cyber criminals are increasingly targeting small and medium-sized enterprises (SMEs) too. Due to their size, SMEs are more at risk of cyber attacks: they often lack the funds to enforce strong cybersecurity practices, and if they work with large companies, they're especially enticing to hackers. In light of such threats, SMEs need to ensure their customers' private information will be kept safe from hackers.


Here are three big picture steps smaller organizations can take to defend themselves.

Avoiding Fatal Mistakes: How SMEs in Healthcare Can Learn from the Anthem Breach

Posted by Kevin Landt on Jan 27, 2016


The breach of Anthem Insurance is a story that small and medium-sized enterprises in the healthcare industry can learn from so that they avoid facing the same fate as the health insurer. Here’s a look at how the hack happened and how two basic security tools—network security monitoring and encryption—would have protected Anthem.

Transforming IT Security at Mid-Market Organizations

Posted by Security Steve on Jan 5, 2016

If you are like most IT professionals these days, you are no doubt juggling an increasingly complex security landscape while struggling to stay up-to-date with the latest tools and techniques.


This can add up to an incredible amount of unproductive time. In fact, according to IDC, 35% of organizations spend more than 500 hours a month just reviewing security alerts, and The Ponemon Institute has revealed that some organizations waste a staggering 395 hours per week on average just investigating false positives!


EiQ Networks Launches AWS SOCVue Portal for Real-Time CyberThreat Visibility

Posted by Vijay Basani on May 20, 2015

Cybercriminals have small businesses worrying that their networks will be the next targets. With large corporations like JP Morgan and Home Depot admitting that they’ve been victims of a cyber breach, small businesses worry that their networks aren’t secure enough to prevent or withstand a cyberattack. Small businesses need continuous security monitoring, but they don’t have the financial resources of large enterprises.

Consumer Trust in Small Business Security

Posted by Vijay Basani on Jul 16, 2014

Late November 2013 began last year’s holiday shopping season, and with that, one of the biggest consumer data breaches in America’s corporate history. Across America, approximately 40 million consumers had their information compromised, and this information included “customer names, card numbers, expiration dates and the short verification codes known as CVVs — everything an attacker would need to create a counterfeit card,” NBC reported. As a consequence of the breach and its costly aftermath, Target CEO Gregg Steinhafel resigned in May 2014. The New York Post reported that Target’s profits dropped by $440 million after the breach.

New Security Intelligence Tools Help SMBs

Posted by Security Steve on Feb 12, 2014

With the increasing number of high-profile security breaches, companies of all sizes need to take active steps to fortify their security infrastructure to protect against cyber attacks and ensure network continuity.  EiQ has introduced three new security intelligence tools available at a freemium, to help companies monitor access to sensitive data to reduce costly data breaches and optimize network performance. 

Read More

Tags: RSA, SME

Small Business Just as Susceptible to Attacks

Posted by Vijay Basani on Sep 4, 2013

The Verizon Data Breach Investigations Report 2013 clearly demonstrated that small and midsize businesses are as susceptible to advanced threats as large enterprises. The report indicated that SMBs are targets of espionage and financial fraud. Small businesses are often times the creators and innovators of valuable intellectual property (IP) and its incredibly important that SMBs be extremely concerned about protecting their business from espionage, advanced threats and cyber attacks. The impact of a data breach on SMBs can be downright devastiving.

Most Recent Posts

Subscribe to Email Updates