The Human Factor: The Hidden Problem of Cybersecurity
Humans are a significant factor contributing to data breaches. While cybersecurity is usually treated as [...]
WFH Cybersecurity Best Practices for SMEs
WFH cybersecurity best practices are virtually non-existent in 49 percent of businesses. The sudden shift [...]
What is an Incident Response Plan: Basic Guidelines for SMEs
An incident response plan provides detailed steps for crisis management in the face of a [...]
Moral Hazard of Cyber Insurance
Cyber insurance is not a replacement for harm prevention measures. The prices are high and [...]
CYDEF to Scale Beyond 1 Million Endpoints
CYDEF solution testing with CENGN establishes business capacity to grow beyond 1 million endpoints. CYDEF Identifies Opportunities to Scale [...]
macOS Coverage: Is It Worth It?
With CYDEF’s recent coverage expansion to the macOS platform, we need to address the value [...]
4 Hurdles Facing MSPs When a Client is Breached
MSPs face considerable hurdles when a client experiences a data breach. 97% of MSPs [...]
Monitoring for Insider Threat
Insider threat incidents account for 34% of data breaches. CYDEF’s detection capabilities are not limited to [...]
Law Firm Size Doesn’t Insulate Against Cyber Attack
100% of law firms participating in a cybersecurity experiment had been targeted by cyber threats. [...]
Phishing Campaigns Bypass Reputation Engine
The team at CYDEF observed an increasing proportion of phishing attempts that leverage trusted sites to bypass filtering [...]
Medical Practices: A Steady Target for Cyber Attack
Medical practices are falling prey to cyberattacks at an exponential rate. Some outlets report that [...]
Living-Off-The Land Attacks: The Democratization of Cyber Threats
Cyber attacks are not the exclusive realm of sophisticated attackers. These attacks get democratized very quickly. To illustrate this point, we’ll [...]