Articles by category

What is an Incident Response Plan: Basic Guidelines for SMEs

An incident response plan provides detailed steps for crisis management in the face of a cyber attack. Planning for When a Cyber Attack Strikes Incident response planning may seem like the projection of the worst-case scenario. That’s because it actually is. An incident response plan provides Small and Medium Enterprises (SMEs) with the guidelines to react and recover when a [...]

By |May 5, 2021|Categories: Blog, Business|Tags: , , |

Moral Hazard of Cyber Insurance 

Cyber insurance is not a replacement for harm prevention measures. The prices are high and will continue to go up. Here’s why. While doing research for a customer about trends you can expect for 2021, I found  a number of outlets warning that the cyber insurance market was hardening with rises in premiums. Should we expect this trend to continue or will premiums stabilize? If [...]

By |April 28, 2021|Categories: Blog, Technical|Tags: , , , |

CYDEF to Scale Beyond 1 Million Endpoints

CYDEF solution testing with CENGN establishes business capacity to grow beyond 1 million endpoints.   CYDEF Identifies Opportunities to Scale at Cost  Over the course of 6 months, CYDEF collaborated with Canada’s Centre of Excellence in Next Generation Networks (CENGN) to establish the capacity of its cybersecurity solutions.    By partnering with CENGN, CYDEF proved that its architecture scales successfully beyond 100,000 devices. With this knowledge, CYDEF has developed [...]

By |April 22, 2021|Categories: Blog, Business|Tags: , , |

macOS Coverage: Is It Worth It?

With CYDEF’s recent coverage expansion to the macOS platform, we need to address the value of cybersecurity protection for Macs. After all, aren’t Macs completely impervious to security threats? The answer is no of course. So why is the question "Do I need Malware Protection for Mac?" so popular? This post will start by covering the security advantages of the [...]

By |April 12, 2021|Categories: Blog, Technical|Tags: , , , , |

4 Hurdles Facing MSPs When a Client is Breached

MSPs face considerable hurdles when a client experiences a data breach. 97% of MSPs experience churn after a client ransomware incident. Will Your Business Survive a Client Breach? Your Client’s May Not. When a client’s business suffers from a ransomware attack on their MSP’s watch, they may not survive. Small and medium-sized businesses (SMBs) are twice as likely to [...]

By |April 7, 2021|Categories: Blog, Business|Tags: , , |

Monitoring for Insider Threat  

Insider threat incidents account for 34% of data breaches. CYDEF’s detection capabilities are not limited to external cyber attacks. They are also valuable detection controls that detect unusual activity on the inside of an organization.  What is Insider Threat?   Cybersecurity is focused on keeping malicious attackers out of business systems.  But what if the malicious attacker is already inside the business, with access [...]

By |March 30, 2021|Categories: Blog, Business|Tags: , , |

Law Firm Size Doesn’t Insulate Against Cyber Attack

100% of law firms participating in a cybersecurity experiment had been targeted by cyber threats. Some without even knowing it. With an estimated worth approaching $1 trillion, law firms present an attractive target to cybercriminals. Not only do they host sensitive personal data within their networks, they also host data on ongoing litigation. Now that cyber attackers are ransoming data [...]

By |March 29, 2021|Categories: Blog, Business|Tags: , , , |

Phishing Campaigns Bypass Reputation Engine

The team at CYDEF observed an increasing proportion of phishing attempts that leverage trusted sites to bypass filtering resources. The following post addresses some of the detected campaigns and addresses security awareness programs.  Phishing Off the River  In recent posts we took an in-depth look at anti-virus bypass, especially living-off-the-land techniques.   The general concept of these techniques is that, by abusing trusted resources, an attacker can capitalize on the trusted resource’s good reputation to execute malicious code.   [...]

By |March 16, 2021|Categories: Blog, Technical|Tags: , , |

Medical Practices: A Steady Target for Cyber Attack

Medical practices are falling prey to cyberattacks at an exponential rate. Some outlets report that medical data is 10 times more likely to be targeted than banking information. Medical Practices: A Steady Target for Cyber Attack The more than 85% of physicians relying on electronic medical records, and approximately 1 million active physicians in the United States (not including nurse [...]

By |March 15, 2021|Categories: Blog|Tags: , , , |

Living-Off-The Land Attacks: The Democratization of Cyber Threats

Cyber attacks are not the exclusive realm of sophisticated attackers. These attacks get democratized very quickly.   To illustrate this point, we’ll review a potentially unwanted program (PuP) that uses a clever living-off-the-land attack chain to avoid getting blocked.  Living-Off-the-What-Now?  A living-off-the-land (LoL) attack uses the resources that are already present on a computer to perform malicious actions. Rather than loading additional software on the victim device, LoL attacks craftily repurpose resources to launch an [...]

By |March 2, 2021|Categories: Blog, Technical|Tags: , , |

How Cyber Attacks Impact Professional Services Firms

Professional services firms are the victims of cyber attacks at a disproportionate rate. Making up 14% of the US economy, professional services firms are subject to 25% of the attacks on small businesses in the United States. Frankly, it makes sense that attackers target these businesses. Often generating substantial revenues with small staffs, small and medium professional services firms [...]

By |February 24, 2021|Categories: Blog, Business|Tags: |

Glossary of Cybersecurity Terms 

CYDEF created a comprehensive Glossary of Cybersecurity Terms to provide your team with the confidence to make secure, operational decisions about cybersecurity.  Security awareness is a key component to a comprehensive cybersecurity strategy. However, with attacks on the rise, so too is disinformation.  This guide provides clear definitions of common attacks for your reference.  The Glossary is a perfect companion to the CYDEF blog, a resource that provides up-to-date analysis of cyber threats and [...]

By |February 22, 2021|Categories: Blog, Business|Tags: , |
Go to Top