CYDEF created a comprehensive Glossary of Cybersecurity Terms to provide your team with the confidence to make secure, operational decisions about cybersecurity. Security awareness is a key component to a comprehensive cybersecurity strategy. However, with attacks on the rise, so too is disinformation. This guide provides clear definitions of common attacks for your reference. The Glossary is a perfect companion to the CYDEF blog, a resource that provides up-to-date analysis
Based on CYDEF's monitoring activity, we’ve identified the top three cybersecurity threats to our customers. What is a “Threat”? A cybersecurity threat puts your network environment at risk of damage. This includes endpoints (like devices, computers) and apps (like Microsoft 365 accounts). We’ve identified 3 types of threats: Potentially Unwanted Programs (PUPs): Widespread threats,
Cyber attacks impact school boards – students, teachers and administrators alike – at an exponential rate. Schools appear to be a treasure trove of sensitive personal information, the ideal target for a ransomware attack. In fact, Canada’s Internet Registration Authority reported that Canadian school boards experienced, on average, 50 attempted attacks per week during a
Cyber attacks at SolarWinds and FireEye underline the importance of cyber risk management. Breaches happen. The best action is strategic planning. Attacks Can Impact Any Business Regardless of preparation and perimeter defences, cyber attacks impact businesses of all sizes. Last week, a major provider of network management tools reported a significant cyber attack. Their build environment
Managed Detection and Response tools provide SMBs with highly effective cybersecurity in the face of increasingly frequent and complex attacks. What is MDR? Managed Detection and Response (MDR) provides businesses with the capacity to detect threats, respond to incidents, and monitor device, app and network usage. Best of all: a third party takes responsibility for
Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success.