Welcome to the EiQ Networks Blog

Data Breach Details: Eddie Bauer Stores

Posted by Vijay Basani on Sep 23, 2016 8:30:00 AM


Eddie Bauer's stores were recently breached by cybercriminals.

Protecting critical business data and customer information should not be taken lightly. The latest example of a major data breach comes out of Eddie Bauer, a clothing store chain located in Washington.

"Not every Eddie Bauer

customer was affected by the breach, but all would receive identity protection."

The company recently released a statement notifying its customers that its North American stores had been compromised by a security hack between January 2 and July 17 of this year. It did note that not every customer was affected, but that all customers would receive identity protection for 12 months.

Read More

Tags: Cybercrime, Retail, Data Breach, Hacking

Best Practices: Security Monitoring for Credit Unions

Posted by Kevin Landt on Sep 22, 2016 8:30:00 AM


Credit unions must always be on the lookout for potential breaches.

The threat from cybercriminals is real, and credit unions must be on the constant lookout for potential breaches. These institutions are very vulnerable to cyber attacks because of their smaller size, and don't always have the IT infrastructure and resources to thwart cyber attacks like their larger counterparts, according to a new 2016 Beazley Breach Response Insights report.

 

"You're being tested every day, whether you realize it or not," said David Luchtel, Vice President of IT Infrastructure and Operations at WSECU, according to Credit Union Times.

Read More

Tags: Security Monitoring, Cybersecurity, Security Best Practices, Financial Services, Credit Unions

EiQ Leverages the Latest Cloud Technology to Lower TCO and Drive Faster Time to Value

Posted by Kim Ann King on Sep 21, 2016 8:30:00 AM

 

We’ve written recently about the importance of moving your IT security to the cloud and the business benefits of doing so, as well as burst some myths that surround cloud-based security. The fact of the matter is that vendors such as Amazon Web Services provide “a data center and network architecture built to meet the requirements of the most security-sensitive organizations. An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment,” according to the company’s website.

Read More

Tags: TCO, Security Monitoring, Cloud Security

3 Cloud Security Myths

Posted by Shawn O'Brien on Sep 20, 2016 8:30:00 AM

 

Security as a Service has rapidly become one of the hottest cybersecurity trends in 2016. The latest shift in this trend though is the cloud-based options that are available, specifically for the managed IT security services industry. This is primarily due the cost-saving benefits associated with cloud security. Even with this shift, however, there still remains many myths about cloud security. Based on an article by David Spark published on CIO.com called 20 of the Greatest Myths of Cloud Security, EiQ has chosen three of these myths that we believe IT security professionals need to forget about immediately in order to overcome the fear of cloud security and start reaping the benefits.

 

  1. The cloud is fundamentally less secure (in fact it might be safer!)
  2. More breaches occur in the cloud
  3. Maintaining cloud security is just too difficult

Read More

Tags: Cybersecurity, InfoSec, Cloud Security

Why the Cloud Is Good for IT Security Services

Posted by Trevan Marden on Sep 19, 2016 8:30:00 AM


The cloud offers greater IT services than on-premise solutions because it's highly secure.

Can IT professionals rely on the cloud to keep their data safe and secure like they did floppy disks, compact disks and flash drives? After all, for years those units were staple features of business operations and storage. Each of those items proved their worth, but eventually fell in favor to new technology. This time, it's the cloud.

 

"It's not a matter of managing IT security as it is ensuring a breach never happens."

The question today is whether IT professionals can trust the cloud to keep their data secure all the time. Data breaches are a major problem, especially in the banking industry, so it's not a matter of managing IT security as it is ensuring a breach never happens.

Read More

Tags: Data Security, InfoSec, Cloud Security, IT Security

The High Cost of Not Doing Enough for IT Security

Posted by Kim Ann King on Sep 7, 2016 8:30:00 AM

 

When it comes to cybersecurity, companies today typically have three options:

  • Do nothing or the bare minimum, and hope that cyber attackers don’t find you.
  • Keep your current cybersecurity posture as is, without consistent updating or monitoring (and hope cyber attackers don’t find you!).
  • Consider EiQ’s hybrid security as a service to identify threats and vulnerabilities, mitigate risk, and achieve compliance. 

Let’s look at each of these options.

Read More

Tags: Security Monitoring, Cybersecurity, InfoSec, IT Security, Vulnerability Management

NASA Struggles Highlight Importance of Identifying and Remediating Vulnerabilities

Posted by Trevan Marden on Sep 6, 2016 8:30:00 AM

Last week, it was reported by SiliconBeat that NASA’s CIO, Renee Wynn, had allowed an Authority to Operate (ATO) for a key network to expire because the network in question had over 15,000 critical vulnerabilities that had not been properly patched. The move was apparently intended to hold the contractor in charge of maintenance of the devices accountable for their contractual obligations by bringing visibility to the situation.

Read More

Tags: Vulnerability Management, Vulnerability Assessment

Calculating the Real Cost of a Cyber Attack

Posted by Trevan Marden on Aug 30, 2016 8:30:00 AM

As cyber attacks continue to grow in frequency and sophistication, businesses are exposed to increasing risk. At the same time, companies continue to face the challenges of limited time, budgets, and staff to implement effective security programs in order to counter the growing threat of cyber attacks. With a global IT security skills shortage, many companies are struggling to stay secure.

Read More

Tags: ROI, Cyber Attack, IT Security

Hidden Costs to Building a Security and Compliance Practice

Posted by Robert Porzio on Aug 25, 2016 8:30:00 AM

Today’s already vast cyber threat landscape is growing rapidly. Developments in the state of business, commerce, and big data have caused security and compliance challenges—historically concerns for large enterprises—to apply to the small and mid-market. What’s more, data breaches have a growing business impact, as 60 percent of SMBs fail within 6 months of a data breach. This is causing security spending, fueled by the SMB market, to rise to a projected $81 billion just this year.

Read More

Tags: Cybersecurity, SIEM, Partnership

Healthcare Organizations Are Under Cyber Attack

Posted by Shawn O'Brien on Aug 23, 2016 8:30:00 AM

The healthcare industry just keeps getting hammered by cybercriminals in 2016. The reality for healthcare organizations is that cyber attacks are now part of their everyday business and that the best option is to improve their cyber defenses in order to better protect themselves.

 

According to the third annual Experian 2016 Data Breach Industry Forecast report, 91% of all healthcare organizations reported at least one data breach in the last two years. What makes them such prime targets is the price of the valuable information they have. According to this same report, “medical records are worth up to 10 times more than credit card numbers on the black market.”

Read More

Tags: Healthcare, Cyber Attack, Data Breach, HIPAA, Hacking

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?


Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All