Cybersecurity Countermeasures: Tools for Risk Management

A discussion of The Law of Diminishing Returns and Cybersecurity Investment. The Cybersecurity Price Quandary A reasonably good anti-virus product with a bundled firewall can be acquired for less than a dollar per month. Some companies pay ten to a hundred times that for an advanced endpoint detection product or a managed detection service. Larger [...]

By |2021-08-19T12:10:43-04:00October 29, 2020|Blog, Technical|

Cybersecurity Risks Facing a Remote Workforce

Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success. [...]

By |2021-09-19T07:04:11-04:00October 22, 2020|Blog, Business|

Risques de cybersécurité auxquels sont confrontés une main-d’œuvre à distance

Les cybermenaces affrontent à la fois les PME et grandes entreprises tandis que la main-d'œuvre à distance maintient l'économie en vie.  Chasse aux menaces avec un accent sur la sécurisation des appareils  Il n’y a aucun doute que la pandémie mondiale a changé notre façon de travailler. Même les personnes employées par une entreprise travaillent seuls, utilisent de nouveaux outils et comptent sur la frontière numérique pour réussir. La tendance du travail à domicile (TAD) est devenue [...]

By |2021-08-19T15:51:24-04:00October 22, 2020|Affaires, Blogue|

Combatting Cyber Alert Fatigue

The more endpoint breach alerts that sound, the less responsive a cybersecurity team becomes. The likelihood of an endpoint breach increases. Distinguishing Important Alerts from Noise Everyone experiences alert fatigue. Alert fatigue is such a common problem that it dates as far back as Aesop’s Fable from the 6th century BC: There once was a shepherd [...]

By |2021-08-19T12:11:19-04:00October 15, 2020|Blog, Technical|

What ‘Endpoint Breaches’ Mean to your Small Business

A guide to endpoint threats and breaches for small business owners. Three Threats All SMB Owners Should Know About An endpoint is any remote device accessing your business network. This may include phones, laptops, tablets, watches, or any other mobile computing device. These endpoints are easy targets for cybercriminals. Mobile devices connect not only to [...]

By |2021-08-19T12:11:25-04:00October 8, 2020|Blog, Business|

Qu’est-ce que les “brèches des points de terminaison” signifient pour votre petite entreprise

Un guide sur les menaces et les brèches des terminaux pour les propriétaires de petites entreprises. Trois menaces que tous les propriétaires de PME devraient connaître Un point de terminaison est tout appareil à distance accédant à votre réseau d'entreprise. Cela peut inclure des téléphones, des ordinateurs portables, des tablettes, des montres ou tout autre [...]

By |2021-08-19T16:16:34-04:00October 8, 2020|Affaires, Blogue|

Responding to Dridex

An analysis of Dridex, the 'banking' malware that steals credentials. How CYDEF Responded to a Dridex Attack The Dridex trojan has posed a significant threat since its identification in 2011. A few months back, a CYDEF customer was infected by this malware. The following blog post details steps to malware identification, response efforts and remediation. [...]

By |2021-08-19T12:11:31-04:00October 1, 2020|Blog, Technical|
Go to Top