Articles by category

Small Businesses Need Software Updates

Software updates and patches are frequently avoided by small and medium business owners. These critical updates are thought to take up too much time to download and install, while they offer little business value. Software Updates Offer More Than New Functionality When it comes to saving time, Small and Medium Business owners develop their own unique tactics. One that [...]

By |June 3, 2021|Categories: Blog, Business|Tags: , , |

The Human Factor: The Hidden Problem of Cybersecurity

Humans are a significant factor contributing to data breaches. While cybersecurity is usually treated as a technology problem, 88% of data breaches are the result of human error. Human Factor in Cybersecurity The human factors in cybersecurity are actions or events that result in a data breach. These factors largely result from a lack of awareness, negligence, or inappropriate access [...]

By |May 19, 2021|Categories: Blog, Business|Tags: , , |

WFH Cybersecurity Best Practices for SMEs

WFH cybersecurity best practices are virtually non-existent in 49 percent of businesses. The sudden shift to remote working in early 2020 caught many businesses off guard, with most businesses prioritizing ‘getting things done’ over IT security. WFH Cybersecurity Threats Continue to Grow Working from Home (WFH) suddenly became the new normal at the beginning of the pandemic. According to many [...]

By |May 12, 2021|Categories: Blog, Business|Tags: , , , |

What is an Incident Response Plan: Basic Guidelines for SMEs

An incident response plan provides detailed steps for crisis management in the face of a cyber attack. Planning for When a Cyber Attack Strikes Incident response planning may seem like the projection of the worst-case scenario. That’s because it actually is. An incident response plan provides Small and Medium Enterprises (SMEs) with the guidelines to react and recover when a [...]

By |May 5, 2021|Categories: Blog, Business|Tags: , , |

CYDEF to Scale Beyond 1 Million Endpoints

CYDEF solution testing with CENGN establishes business capacity to grow beyond 1 million endpoints.   CYDEF Identifies Opportunities to Scale at Cost  Over the course of 6 months, CYDEF collaborated with Canada’s Centre of Excellence in Next Generation Networks (CENGN) to establish the capacity of its cybersecurity solutions.    By partnering with CENGN, CYDEF proved that its architecture scales successfully beyond 100,000 devices. With this knowledge, CYDEF has developed [...]

By |April 22, 2021|Categories: Blog, Business|Tags: , , |

4 Hurdles Facing MSPs When a Client is Breached

MSPs face considerable hurdles when a client experiences a data breach. 97% of MSPs experience churn after a client ransomware incident. Will Your Business Survive a Client Breach? Your Client’s May Not. When a client’s business suffers from a ransomware attack on their MSP’s watch, they may not survive. Small and medium-sized businesses (SMBs) are twice as likely to [...]

By |April 7, 2021|Categories: Blog, Business|Tags: , , |

Monitoring for Insider Threat  

Insider threat incidents account for 34% of data breaches. CYDEF’s detection capabilities are not limited to external cyber attacks. They are also valuable detection controls that detect unusual activity on the inside of an organization.  What is Insider Threat?   Cybersecurity is focused on keeping malicious attackers out of business systems.  But what if the malicious attacker is already inside the business, with access [...]

By |March 30, 2021|Categories: Blog, Business|Tags: , , |

Law Firm Size Doesn’t Insulate Against Cyber Attack

100% of law firms participating in a cybersecurity experiment had been targeted by cyber threats. Some without even knowing it. With an estimated worth approaching $1 trillion, law firms present an attractive target to cybercriminals. Not only do they host sensitive personal data within their networks, they also host data on ongoing litigation. Now that cyber attackers are ransoming data [...]

By |March 29, 2021|Categories: Blog, Business|Tags: , , , |

How Cyber Attacks Impact Professional Services Firms

Professional services firms are the victims of cyber attacks at a disproportionate rate. Making up 14% of the US economy, professional services firms are subject to 25% of the attacks on small businesses in the United States. Frankly, it makes sense that attackers target these businesses. Often generating substantial revenues with small staffs, small and medium professional services firms [...]

By |February 24, 2021|Categories: Blog, Business|Tags: |

Glossary of Cybersecurity Terms 

CYDEF created a comprehensive Glossary of Cybersecurity Terms to provide your team with the confidence to make secure, operational decisions about cybersecurity.  Security awareness is a key component to a comprehensive cybersecurity strategy. However, with attacks on the rise, so too is disinformation.  This guide provides clear definitions of common attacks for your reference.  The Glossary is a perfect companion to the CYDEF blog, a resource that provides up-to-date analysis of cyber threats and [...]

By |February 22, 2021|Categories: Blog, Business|Tags: , |

How Cyber Attacks Impact School Boards

Cyber attacks impact school boards – students, teachers and administrators alike – at an exponential rate. Schools appear to be a treasure trove of sensitive personal information, the ideal target for a ransomware attack. In fact, Canada’s Internet Registration Authority reported that Canadian school boards experienced, on average, 50 attempted attacks per week during a 3-week testing period. Students, Teachers [...]

By |January 25, 2021|Categories: Blog, Business|Tags: , , |

Data Breaches: The Reality of Cybersecurity 

Cyber attacks at SolarWinds and FireEye underline the importance of cyber risk management. Breaches happen. The best action is strategic planning.   Attacks Can Impact Any Business Regardless of preparation and perimeter defenses, cyber attacks impact businesses of all sizes.   Last week, a major provider of network management tools reported a significant cyber attack. Their build environment was compromised so that [...]

By |December 17, 2020|Categories: Blog, Business|Tags: , , |
Go to Top