Peace on Earth2021-11-19T14:21:01-05:00

Peace on Earth

and cybersecurity for all

It’s the most wonderful time of the year…
for cyber criminals

Your team is busy. Stress levels are higher than usual. You have more people working from home than ever before. Everyone is distracted. Maybe you spilled eggnog on your computer. And you’re preparing to close up shop for a few days to give your staff a well-deserved break.

This is a perfect opportunity for cyber criminals to attack your business. They prey on your emotions, stress, busy schedule, and reduced personnel.

It is well-known within the cybersecurity community that attacks rise significantly during the holidays.

And we want to help.

From now until Jan. 5, 2022, we will protect your business for free.

Yes, you read that right.

If your organization has at least 10 laptops or computers to protect, you can install our lightweight cybersecurity agent completely free for the duration of the holidays.

If on January 6, you no longer wish to use our services, no problem. You will have made it through the most dangerous time of year unscathed. You’ll bask in the glow of cyber safety as you read about all the cyber attacks that happened over the holidays. You’ll count all the money you didn’t have to pay in ransomware. You’ll smile and take pride in the very smart decision you made today.

Or you’ll kick yourself because you passed this up.

And that would be a shame.

Protect your business today.

Ready to get started? Fill out the form below and we’ll get you set up.

Min. 10 devices for this offer. No upfront payment or credit card information required. You are under no obligation and can cancel any time. To be fully protected, you must install the software on all Internet-connected computers and laptops in your organization. Please see our Privacy Policy and Terms of Service.

So, what’s the catch?

There isn’t one. Honestly. We genuinely believe everyone should feel safe to do business online. In fact, that’s our unofficial slogan.

If you decide you want to continue protecting your organization from cyber attacks, you will be given the opportunity to upgrade to a paid plan. No high-pressure sales tactics.

If you don’t feel your organization needs cybersecurity after the holidays, you can simply uninstall our software.

It’s that easy.

And it gets better: You barely need to lift a finger. We provide the people, process, and technology as a turnkey service.

Fill out the form below to get started or review some of our most common Frequently Asked Questions below.

What’s included?

For the duration of the holidays, you will get:

What our clients have to say

Jason Dunk
Chief Technology Officer, Saskatoon Public Schools

At MDK Business Law, we work every day with technology and other knowledge-based businesses. As you can imagine, our legal team is privy to very sensitive client information which we access from a variety of locations and devices. Prior to working with the CYDEF team, we lacked visibility into our cybersecurity situation but we knew that we needed to take proactive measures to keep our clients’ data secure. CYDEF provides us with peace of mind through the use of SMART-Monitor on all of our workstations. We’re experts in the law, not cybersecurity, so we are very pleased that CYDEF provides us with a first-class solution that secures our confidential information from malicious attacks.

Naomi Morisawa De Koven, Managing Lawyer

Need more information?

Download some additional resources here.

Frequently Asked Questions

How is CYDEF different?2021-11-15T13:16:19-05:00

Our competitors try to predict what cyber criminals will do next. That’s extremely difficult to do, especially since they tend to work in large, highly organized, highly sophisticated, international crime rings. Unfortunately, as we keep seeing in the news, ransomware attacks are on the rise, with no end in sight.

CYDEF is different because we review all the activity on your devices and confirm if it’s safe and expected. Our team of experts analyze anything that doesn’t meet those criteria, and we respond swiftly to protect your business.

In other words, instead of looking for a needle in a haystack, we’re inspecting each piece of hay to ensure it’s really hay. For example: If a PDF file wants to install an .exe file, that’s unusual and unexpected, and would get flagged for review by an analyst. The PDF file itself may look safe to our competitors, but what it’s trying to do is not.

Our list of safe activities grows exponentially with every device we protect, benefiting all CYDEF clients.

This unique approach, along with our combination of machine learning and human analysis, makes our solution truly revolutionary.

Why do I need cybersecurity if I have a firewall and anti-virus program?2021-11-15T13:15:34-05:00

Our solution identifies threats that evade firewalls and anti-virus. This includes policy violations, crypto mining, ransomware, and espionage. AV can only prevent attacks from malicious software that it has previously encountered. Any never-before-seen attacks (known as “zero-day” attacks) can slip right through.

Sadly, every business is at risk. Cyber criminals use your devices to conduct illegal activity, hold your data hostage, and spread their malware to others (including your clients). The SolarWinds Supply Chain attack of 2020 is a perfect example. Criminals used SolarWinds to infect thousands of other organizations.

And they aren’t only targeting large enterprises. If you have computers connected to the Internet and data that is valuable to you, your staff, or your clients — you’re at risk.

It’s no longer a matter of if a business will be breached, it’s when.

We get it. That sounds like fear mongering.

But sadly, it’s true. In fact, cyber insurance companies no longer offer $10 million policies for that very reason. And even the insurance companies themselves are not immune.

I’ve already been attacked, what are the odds it will happen again?2021-11-15T13:15:00-05:00

Sadly, repeat attacks are very common. In fact, 80% of ransomware victims suffer repeat attacks. Typically, repeat attacks happen 12-13 months apart. Cyber criminals give your business just enough time to recover before they come after you again.

What do I need to sign up?2021-11-15T13:14:25-05:00

The only thing you need is a business email address. You don’t need a credit card and you won’t be asked to sign a contract. Simply fill out the form with your business email and we’ll send you what you need.

What happens after I sign up?2021-11-15T13:13:59-05:00

You’ll receive an email from our team with a link to download our light-weight agent. You’ll need to install that software on every device in your organization. If you only install it on a few devices, you won’t be fully protected… That’s like locking your front door, but leaving all the windows wide open. We can’t keep your business safe that way.

Once you have the agent installed on all your laptops and computers, you’ll be granted access to our cybersecurity dashboard with 24/7 monitoring.

SMART-Monitor Dashboard
(click to enlarge)

How many devices can I protect?2021-11-15T13:13:02-05:00

For this offer, we are requiring a minimum of 10 devices, with no maximum. You can install it on as many devices as you have. Twenty? No problem. Twenty thousand? Fine by us.

What if I already have a cybersecurity solution in place?2021-11-15T13:12:24-05:00

Our system is compatible with most other cybersecurity solutions, so it shouldn’t be a problem. After submitting the form, one of our representatives will be in touch and they can assist you with the specifics at that time.

How much bandwidth is required?2021-11-15T13:10:05-05:00

All data processing is done in the cloud, so the impact on your system is minimal. Bandwidth varies by usage but is approximately 3 GB/mo/device.

What are the minimum technical requirements?2021-11-15T13:09:17-05:00

Minimum technical requirements

  • System resources: 2GB RAM, 1GB in disk space
  • Internet access with ports 443, 5671 and 5672 open between the agent and the Internet*
  • Bandwidth: approx. 3 GB/mo/device (varies)

Windows:

  • Windows 11, 10, Vista, 8, 7 SP1. Windows Server 2019, 2016, 2012 R2 & 2008 R2
  • .NET Framework v4.6.1, Sysmon v10.42, WMF (Powershell) v5.1, TLS v1.2
  • * Windows 7 requires port 1883 to Microsoft

Mac:

  • macOS: Catalina 10.15+

Linux support arriving in 2022.

 

An award-winning partner you can trust

Sign up today and sleep well through the holidays!

Sign up now

© Cyber Defence QCD Corporation (CYDEF). All Rights Reserved.

Go to Top