Articles by category

Why MDR is Mission Critical for SMBs

Managed Detection and Response tools provide SMBs with highly effective cybersecurity in the face of increasingly frequent and complex attacks. What is MDR? Managed Detection and Response (MDR) provides businesses with the capacity to detect threats, respond to incidents, and monitor device, app and network usage. Best of all: a third party takes responsibility for management of the tool. [...]

By |November 5, 2020|Categories: Blog, Business|Tags: , |

Cybersecurity Risks Facing a Remote Workforce

Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success. The work-from-home trend has become [...]

By |October 22, 2020|Categories: Blog, Business|Tags: , |

What ‘Endpoint Breaches’ Mean to your Small Business

A guide to endpoint threats and breaches for small business owners. Three Threats All SMB Owners Should Know About An endpoint is any remote device accessing your business network. This may include phones, laptops, tablets, watches, or any other mobile computing device. These endpoints are easy targets for cybercriminals. Mobile devices connect not only to the corporate network, but to [...]

By |October 8, 2020|Categories: Blog, Business|Tags: , |

Building Partnerships for Strong Cybersecurity

As Managed Service Providers (MSPs) grow increasingly popular amongst small and medium businesses, they’ve also become a target for cybercriminals. In 2019, at least 13 MSPs were hacked. Successfully breaching an MSP’s environment provides attackers with access to corporate data from a range of enterprises – a veritable boon of sensitive information. Vulnerability Management Required for Service Providers According [...]

By |September 24, 2020|Categories: Blog, Business, News|Tags: , |

What is Layered Security?

Layered security protects network environments by erecting several perimeter defenses. In order to protect your data – and your organization’s reputation – you need a layered cybersecurity approach. Introducing: Layered Security The cyber threats prevalent on the internet range in complexity. Some come from email attachments, others from direct attacks to your small or medium (SMB) business’s network environment. [...]

By |September 10, 2020|Categories: Blog, Business|Tags: , |

Managed EDR vs Antivirus: A Primer

Your standard anti-virus solution isn't up to the task of catching the nastiest threats on the Internet. Cybersecurity Maintenance Requires Dedication Managing your own IT solutions while growing a business is a big task. Add keeping up with evolving cybersecurity threats and any business owner will feel daunting. That’s why CYDEF is dedicated to providing tips and tricks to support [...]

By |August 27, 2020|Categories: Blog, Business|Tags: |

The Endpoint Security Solution for Managed Service Providers

CYDEF was born to serve small businesses, including our partners and Managed Service Providers.The Evolution of Canada’s Cyber Defense PartnerCYDEF started out with a single goal: to commoditize cybersecurity. As we grew, we heard from channel partners about an unmet need: threat hunting for their managed SMB clients. With that, our channel story began to unfold. Back in 2017, we started [...]

By |August 20, 2020|Categories: Blog, Business, News|Tags: , |

The Evolution of Cyber Defense

Introducing CYDEF, a continuously evolving cybersecurity platform that defends small and medium sized enterprises (SMEs) against threats from the security landscape.CYDEF sprouted out of a desire to protect Canadian businesses of all sizes online. Over the past 3 years, CYDEF grew into a continuously evolving security platform that defends small and medium sized enterprises (SMEs) against threats from the cybersecurity [...]

By |August 4, 2020|Categories: Blog, Business|Tags: , , , , |
Go to Top