Cybersecurity for remote workers (infographic)
Infographic Transcription: Cybersecurity for remote workers TAKE CYBERSECURITY HOME WITH YOU More [...]
How MDR Improves Your Managed Service Business’ Bottom Line
Managed Detection and Response (MDR) solutions improve a managed service business’s bottom line by reducing [...]
Data Breaches and How to Prevent Them
Data breaches occur when a cyber attacker illegally accesses confidential information. Investing in cybersecurity awareness [...]
Handling Ransomware Attacks to Minimize Disaster
Ransomware attacks take place in two phases: access development, then monetization. Stopping cyber attacks while [...]
SOC 2: What Is It and Why Should You Care
SOC 2 is a reporting standard used to assess a business’ internal controls related to Information Technology. It is [...]
CYDEF’s Approach to a Secure Software Development Life Cycle
A Secure Software Development Life Cycle (SSDLC) is a collection of best practices that provides added security checks to the standard software development [...]
Cyber Threat Research: Nuclear Power Plant Cyber Attack
In early September 2019, the Kudankulam Nuclear Power Plant in Tamil Nadu, India suffered a [...]
Cybersecurity: The Need To Find Common Ground
According to Colonial Pipeline CEO Tim Felt, paying ransom for the return of his company’s data was the hardest thing [...]
5 Reasons Technological Debt Increases the Risk of Cyber Attack
Failing to keep software and hardware up-to-date can put your business at risk for cyber [...]
2021 Mid-Year Threat Review
As the first half of 2021 comes to a close, I decided to look back [...]
Cyber Immunity in an Era of Rampant Attacks
Cyber immunity is a critical component to a successful cybersecurity strategy, especially in an era [...]
EDR Price Comparison
EDR price comparison is not the best criteria to use when selecting your Managed Service’s [...]