4 Hurdles Facing MSPs When a Client is Breached
MSPs face considerable hurdles when a client experiences a data breach. 97% of MSPs [...]
Monitoring for Insider Threat
Insider threat incidents account for 34% of data breaches. CYDEF’s detection capabilities are not limited to [...]
Law Firm Size Doesn’t Insulate Against Cyber Attack
100% of law firms participating in a cybersecurity experiment had been targeted by cyber threats. [...]
Phishing Campaigns Bypass Reputation Engine
The team at CYDEF observed an increasing proportion of phishing attempts that leverage trusted sites to bypass filtering [...]
Medical Practices: A Steady Target for Cyber Attack
Medical practices are falling prey to cyberattacks at an exponential rate. Some outlets report that [...]
Living-Off-The Land Attacks: The Democratization of Cyber Threats
Cyber attacks are not the exclusive realm of sophisticated attackers. These attacks get democratized very quickly. To illustrate this point, we’ll [...]
How Cyber Attacks Impact Professional Services Firms
Professional services firms are the victims of cyber attacks at a disproportionate rate. Making [...]
Glossary of Cybersecurity Terms
CYDEF created a comprehensive Glossary of Cybersecurity Terms to provide your team with the confidence to make secure, operational decisions about cybersecurity. Security awareness is a [...]
AV vs EDR: An Introduction to Antivirus Bypass
Cyber attackers use sneaky tricks to evade detection. This post reviews the classes of attacks [...]
A $100,000 Save Made by Detecting Emotet
The malware known as Emotet is back in action. Now, it’s more malicious than [...]
How Cyber Attacks Impact School Boards
Cyber attacks impact school boards – students, teachers and administrators alike – at an exponential [...]
Tracking Cyber Exposure
Tracking cyber exposure requires detailed investigation to understand how a network has been breached and [...]