Welcome to the EiQ Networks Blog

Hidden Costs to Building a Security and Compliance Practice

Posted by Robert Porzio on Aug 25, 2016 8:30:00 AM

Today’s already vast cyber threat landscape is growing rapidly. Developments in the state of business, commerce, and big data have caused security and compliance challenges—historically concerns for large enterprises—to apply to the small and mid-market. What’s more, data breaches have a growing business impact, as 60 percent of SMBs fail within 6 months of a data breach. This is causing security spending, fueled by the SMB market, to rise to a projected $81 billion just this year.

Read More

Tags: Cybersecurity, SIEM, Partnership

Healthcare Organizations Are Under Cyber Attack

Posted by Shawn O'Brien on Aug 23, 2016 8:30:00 AM

The healthcare industry just keeps getting hammered by cybercriminals in 2016. The reality for healthcare organizations is that cyber attacks are now part of their everyday business and that the best option is to improve their cyber defenses in order to better protect themselves.

 

According to the third annual Experian 2016 Data Breach Industry Forecast report, 91% of all healthcare organizations reported at least one data breach in the last two years. What makes them such prime targets is the price of the valuable information they have. According to this same report, “medical records are worth up to 10 times more than credit card numbers on the black market.”

Read More

Tags: Healthcare, Cyber Attack, Data Breach, HIPAA, Hacking

Layered Cybersecurity Provides the Best Protection

Posted by Kim Ann King on Aug 18, 2016 8:30:00 AM

 

One need only read the headlines to know how insecure company data and networks are these days. Just a few weeks ago, U.S. health insurer Banner Health informed 3.7 million customers and healthcare providers that their data may have been stolen. This has become a fairly common scenario as healthcare records and private data are traded openly on the black market. Thinking through all of the likely attack vectors, it seems almost impossible for organizations to completely secure their intellectual property, customer data, and other corporate records. For example, employees might not know that malware need not be downloaded in a file or executable but simply through clicking on an infected banner ad or even a link in social media. If an organization has a “bring your own device” to work policy, a mobile phone or tablet infected at home can spread easily malware to the corporate network.

Read More

Tags: Cybersecurity, Security Best Practices, InfoSec

Data Breach Alert: Yahoo Struck by Hacker “Peace” – 200 Million Accounts Affected

Posted by Shawn O'Brien on Aug 17, 2016 8:30:00 AM

Another big name gets added to the list of 2016 data breaches. Yahoo, the multinational technology company, has its hands full as it deals with trying to confirm the possibility of a data breach. The infamous hacker that goes by the tag of “Peace” has listed a cache of what allegedly appears to be 200 million stolen Yahoo user accounts for sale on the Dark Web. Yahoo has already begun a thorough forensic analysis investigation to the determine the validity of the hacker’s claims and promises that it’s taking this breach "very seriously.” According to reports by Motherboard, the cache supposedly contains usernames, passwords, and dates of birth. At this time, the stolen user data is currently being sold for 3 Bitcoins, or around $1,860, and apparently contains records from “2012 most likely,” according to hacker Peace. Peace has also provided a way to unscramble the hashed credentials, making it easier for buyers to use the stolen information once they get their hands on it.

Read More

Tags: Cybercrime, Data Breach, InfoSec, Hackers

3 Global Cybersecurity Standards Every Professional Should Know

Posted by Kevin Landt on Aug 16, 2016 8:30:00 AM

 

Cybersecurity standards are sets of best practices for protecting organizations from cyber attacks. There are many groups across the world that establish and promulgate their recommended cybersecurity standards. These range from nondecision-making bodies of experts sharing information to treaty-based governmental associations.

 

The various frameworks each have their own advantages and disadvantages. Starting with the familiar U.S. federal government's approach and then moving on to other standards around the globe, the following introduces three cybersecurity standards or approaches to standards and why they matter for small- to medium-sized businesses.

Read More

Tags: IT Professionals, Cybersecurity, IT Security

What Makes Silicon Valley Such a Target for Cyber Attacks?

Posted by Kim Ann King on Aug 11, 2016 8:30:00 AM

Silicon Valley is a nickname for the southern part of the San Fransisco Bay Area, a region that hosts many of the world's biggest technology companies, including giants like Facebook and Google. The area increasingly finds itself the target of consumer ire for violating privacy expectations, changing product performance in uncomfortable ways, and more.

Read More

Tags: Cybercrime, Cyber Attack, Cybersecurity, Hackers

There’s More than Meets the Eye: Going Beyond Covering Your Laptop Camera

Posted by Shawn O'Brien on Aug 10, 2016 8:30:00 AM

 

In June 2016, Facebook CEO Mark Zuckerberg made The New York Times for covering his laptop camera with tape. The following explains why individuals choose to block their webcam lenses, and why this cybersecurity technique is not enough.

Read More

Tags: Privacy, Cybersecurity, InfoSec, Hackers

Is Changing Your Password Actually Making You Less Secure?

Posted by Trevan Marden on Aug 9, 2016 8:30:00 AM

We’ve recently written a number of posts about the role that passwords and strong authentication methods play in security. Locking down logins and implementing access controls has long been a cornerstone of information security. Most information security professional understand the factors that make passwords strong. For a quick refresher, check out our recent post on the subject. In short, a strong password is typically very long; includes numbers, mixed case, and special characters; includes no words or discernible patterns and is definitely not your pet’s name. You should also never reuse the password or use the same password across multiple systems.

Read More

Tags: Security Monitoring, IT Security, Password

In Charge of Your Company’s Cybersecurity? 3 Tips to Handle That Responsibility

Posted by Vijay Basani on Aug 4, 2016 8:30:00 AM

CISOs (Chief Information Security Officers) or others who are in charge of a company's cybersecurity face a huge responsibility: they have to keep their firms' IT assets safe not just from malicious insiders and accidental leaks, but also from every hacker around the globe—at a time when more hacking scandals happen all the time.

 

EiQ has previously discussed the technical, interpersonal, and leadership skills required for CISOs to meet this challenge, and today we add three tips they can follow in order to perform at their best and manage the responsibility of their role.

Read More

Tags: IT Professionals, Cybersecurity, InfoSec, IT Security

Strong Password Management is Critical to Network Security

Posted by Kim Ann King on Aug 3, 2016 8:30:00 AM

 

Passwords may be one of the most misunderstood elements of network security. The critical importance of the role passwords play in thwarting cybersecurity breaches cannot be downplayed or understated. Weak passwords undermine a company’s network. One of the key points of security tools, such as network security monitoring, is to flag unusual (and therefore suspicious) activity on an organization's computer systems. If passwords are so simplistic that hackers can guess them correctly in a normal number of attempts, then cybersecurity software is much less likely to notice and flag these cybercriminals' efforts.

Read More

Tags: Network Security, Cybersecurity, Security Best Practices, Password

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?


Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All