Welcome to the EiQ Networks Blog

3 Things About Cybersecurity Your Boss Wants to Know

Posted by Kevin Landt on Oct 25, 2016 8:30:00 AM

Are CEOs aware of cybersecurity best practices? They should be.

Managers are versatile employees who understand how to run departments and motivate employees, but they may not always be the most well informed about cybersecurity. However, this isn't their fault!


The landscape of cybersecurity changes every day, and IT professionals must always stay on their toes to protect networks against new, advanced phishing and malware attacks. After all, cybercriminals are always on the lookout for new holes and weakness to exploit. Department managers simply don't have the time to run teams and IT security practices. 


IT professionals need to keep management well informed about new IT security protocols, updates, possible breaches, and actual attacks. In more detail, here are three things your boss wants to (or should know) about cybersecurity:

Read More

Tags: Cybersecurity, IT Security, Executives

How a Security Breach Hurts Your Businesses' Bottom Line

Posted by Shawn O'Brien on Oct 24, 2016 8:30:00 AM

Security breaches can greatly impact your company's bottom line.

As a business owner, you need to take IT security seriously. Not doing so threatens your company's bottom line due to lost customers and revenue - and possibly top officials if they lose their jobs, which can destabilize departments.


As proof IT security can cost your company a bundle of money, let's first examine data regarding how customers feel about and act towards companies that have been breached.

Read More

Tags: Data Breach, Risk Management, Security Risks

How Credit Unions Mitigate Risks in the Digital World

Posted by Kim Ann King on Oct 12, 2016 8:30:00 AM

Credit unions need to be protect themselves from cybercriminals.

Smaller financial instiutions, such as credit unions, need to keep their systems well-protected from cybercriminals, whether they're insiders or those operating from outside of the organizations. To do so, credit unions must first understand just how important IT security is. They must also come to terms with how their IT security capabilities are likely more limited than larger firms with more spending capital. When they accomplish both, they can take the appropriate measures to protect themselves.

Read More

Tags: Cybersecurity, Risk Management, Financial Services, Credit Unions

Breaking Down Yahoo IT Breach of 500 Million User Accounts

Posted by Shawn O'Brien on Oct 11, 2016 8:30:00 AM

500 million Yahoo accounts were breached and possibly stolen in 2014.

IT security is a growing issue that companies must address before it's too late. For example, take Yahoo, which recently experienced what some are calling the biggest breach of all time, when cybercriminals stole information from 500 million user accounts.


"Yahoo believes that criminals stole an assortment of personal information."

Confirmed by Bob Lord of Cisco in a statement, Yahoo believes criminals stole an assortment of personal information from users, although it suggests unprotected passwords, bank account information and payment card data were left untouched.

Read More

Tags: Data Security, Data Breach, Hacking, IT Security

3 Signs You Should Invest in Cybersecurity

Posted by Kevin Landt on Oct 6, 2016 8:30:00 AM

Cybercriminals and IT security shouldn't be taken lightly. One breach can cost your company hundreds of thousands of dollars. If you're not sure whether your company needs to upgrade or completely revamp its cybersecurity practices, here are three warning signs that indicate it should:


"One breach can cost your company hundreds or thousands of dollars."

1. You Don't Understand the Target

IBM executive security advisor Diana Kelley, who co-authored the IBM study "Securing the C-suite," has over two decades of cybersecurity experience. Her company has 7,000 IT professionals protecting the organization from outside threats. But even Kelley recognizes that numerous executives, even at the most influential computer institutions such as IBM, don't take IT security as seriously as they should.

Read More

Tags: Cybersecurity, InfoSec, IT Security

What Are the Most Common Cybersecurity Challenges?

Posted by Shawn O'Brien on Oct 5, 2016 8:30:00 AM

Companies always have to keep their pulse on their IT security.

There are many types of cybercriminals, and the type of data they're searching for can vary. For example, the Congressional Research Service categorizes hackers into criminals, nation-state warriors, terrorists and "hacktivists," and each has their own objectives when performing cyber attacks.


As a business owner, manager or industry professional, it's critical to understand the common challenges that exist when trying to defend against these cybercriminals.

Read More

Tags: Cybersecurity, InfoSec

Companies Are Finding Success When Focusing on IT Security More

Posted by Trevan Marden on Oct 4, 2016 8:30:00 AM

Companies and customers are finding success when they invest in IT security firms.

Cybersecurity firms are becoming a hot commodity for clients that either don't want to or can't expand their own IT security team or desire more than a patchwork piece of hardware to protect their most critical assets.


"One of the very few times a CEO is fired is when you are exposed to a security breach," said Venky Ganesan, Managing Director at Menlo Ventures, according to Fortune. "This will be the last thing cut on the budget because nobody wants to lose their job."

Read More

Tags: Cybersecurity, IT Security

Data Breach Details: Eddie Bauer Stores

Posted by Vijay Basani on Sep 23, 2016 8:30:00 AM

Eddie Bauer's stores were recently breached by cybercriminals.

Protecting critical business data and customer information should not be taken lightly. The latest example of a major data breach comes out of Eddie Bauer, a clothing store chain located in Washington.


"Not every Eddie Bauer

customer was affected by the breach, but all would receive identity protection."

The company recently released a statement notifying its customers that its North American stores had been compromised by a security hack between January 2 and July 17 of this year. It did note that not every customer was affected, but that all customers would receive identity protection for 12 months.

Read More

Tags: Cybercrime, Retail, Data Breach, Hacking

Best Practices: Security Monitoring for Credit Unions

Posted by Kevin Landt on Sep 22, 2016 8:30:00 AM

Credit unions must always be on the lookout for potential breaches.

The threat from cybercriminals is real, and credit unions must be on the constant lookout for potential breaches. These institutions are very vulnerable to cyber attacks because of their smaller size, and don't always have the IT infrastructure and resources to thwart cyber attacks like their larger counterparts, according to a new 2016 Beazley Breach Response Insights report.


"You're being tested every day, whether you realize it or not," said David Luchtel, Vice President of IT Infrastructure and Operations at WSECU, according to Credit Union Times.

Read More

Tags: Security Monitoring, Cybersecurity, Security Best Practices, Financial Services, Credit Unions

EiQ Leverages the Latest Cloud Technology to Lower TCO and Drive Faster Time to Value

Posted by Kim Ann King on Sep 21, 2016 8:30:00 AM


We’ve written recently about the importance of moving your IT security to the cloud and the business benefits of doing so, as well as burst some myths that surround cloud-based security. The fact of the matter is that vendors such as Amazon Web Services provide “a data center and network architecture built to meet the requirements of the most security-sensitive organizations. An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment,” according to the company’s website.

Read More

Tags: TCO, Security Monitoring, Cloud Security

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All