Articles by tag

Small Business Cybersecurity Myths

Small Business Cybersecurity myths and mistakes can destroy a business. Phishing attempts, Potentially Unwanted Programs, and Malware do not differentiate between a small business and a large enterprise. Once infected, a business is at risk – regardless of size. Understanding Cybersecurity Myths The risks posed by cyber attacks are impossible to overlook. From recent attacks on pipelines, to breaches at [...]

By |June 9, 2021|Categories: Blog, Business|Tags: , , , , |

Small Businesses Need Software Updates

Software updates and patches are frequently avoided by small and medium business owners. These critical updates are thought to take up too much time to download and install, while they offer little business value. Software Updates Offer More Than New Functionality When it comes to saving time, Small and Medium Business owners develop their own unique tactics. One that [...]

By |June 3, 2021|Categories: Blog, Business|Tags: , , |

The Human Factor: The Hidden Problem of Cybersecurity

Humans are a significant factor contributing to data breaches. While cybersecurity is usually treated as a technology problem, 88% of data breaches are the result of human error. Human Factor in Cybersecurity The human factors in cybersecurity are actions or events that result in a data breach. These factors largely result from a lack of awareness, negligence, or inappropriate access [...]

By |May 19, 2021|Categories: Blog, Business|Tags: , , |

WFH Cybersecurity Best Practices for SMEs

WFH cybersecurity best practices are virtually non-existent in 49 percent of businesses. The sudden shift to remote working in early 2020 caught many businesses off guard, with most businesses prioritizing ‘getting things done’ over IT security. WFH Cybersecurity Threats Continue to Grow Working from Home (WFH) suddenly became the new normal at the beginning of the pandemic. According to many [...]

By |May 12, 2021|Categories: Blog, Business|Tags: , , , |

What is an Incident Response Plan: Basic Guidelines for SMEs

An incident response plan provides detailed steps for crisis management in the face of a cyber attack. Planning for When a Cyber Attack Strikes Incident response planning may seem like the projection of the worst-case scenario. That’s because it actually is. An incident response plan provides Small and Medium Enterprises (SMEs) with the guidelines to react and recover when a [...]

By |May 5, 2021|Categories: Blog, Business|Tags: , , |

Les 3 menaces de cybersécurité auxquels les PME font face

Basé sur l'activité de surveillance de CYDEF, nous avons identifié les trois principales menaces de cybersécurité pour nos clients Qu'est-ce qu'une “Menace”? Une menace de cybersécurité met votre environnement réseau à risque de dommages. Cela inclut les terminaux (comme les appareils, les ordinateurs, etc..) et les applications (comme les comptes Microsoft 365). Nous avons identifié 3 types de menaces: [...]

By |February 8, 2021|Categories: Business, Blog, Blogue|Tags: , , |

The ART of Selecting a Managed Detection and Response Company

Tips for selecting a managed detection and response company based on Actionable, Relevant and Timely response criteria.  Selecting a Managed Detection and Response Company is a Complex Task Cybersecurity is often difficult to understand, especially for the average business owner. These people devote their time to managing their enterprise, not studying cybersecurity tactics and trends. Unfortunately, that means these businesses may misinterpret basic [...]

By |December 23, 2020|Categories: Blog, Technical|Tags: , , , |

La détection et réponse gérées (MDR) est critique pour les PMEs

Les outils de détection et de réponse gérés fournissent aux PME une cybersécurité très efficace face à des attaques de plus en plus fréquentes et complexes. Qu'est-ce qu’une MDR? La détection et la réponse gérées (MDR) offrent aux entreprises la capacité de détecter les menaces, de répondre aux incidents et de surveiller l'utilisation des appareils, des applications et du réseau. [...]

By |November 5, 2020|Categories: Business, Blogue, Blog|Tags: , |

Why MDR is Mission Critical for SMBs

Managed Detection and Response tools provide SMBs with highly effective cybersecurity in the face of increasingly frequent and complex attacks. What is MDR? Managed Detection and Response (MDR) provides businesses with the capacity to detect threats, respond to incidents, and monitor device, app and network usage. Best of all: a third party takes responsibility for management of the tool. [...]

By |November 5, 2020|Categories: Blog, Business|Tags: , |

Risques de cybersécurité liés à une main-d’œuvre à distance

Les cybermenaces affrontent à la fois les PME et grandes entreprises tandis que la main-d'œuvre à distance maintient l'économie en vie.  Chasse aux menaces avec un accent sur la sécurisation des appareils  Il n’y a aucun doute que la pandémie mondiale a changé notre façon de travailler. Même les personnes employées par une entreprise travaillent seuls, utilisent de nouveaux outils et comptent sur la frontière numérique pour réussir. La tendance du travail à domicile (TAD) est devenue une réalité de la main-d'œuvre.  En même [...]

By |October 22, 2020|Categories: Business, Blogue, Blog|Tags: , |

Cybersecurity Risks Facing a Remote Workforce

Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success. The work-from-home trend has become [...]

By |October 22, 2020|Categories: Blog, Business|Tags: , |

Que signifie une brèche d’un poste de travail pour votre entreprise

Un guide sur les menaces et les brèches des postes de travail pour les propriétaires de petites entreprises. Trois menaces que tous les propriétaires de PME devraient connaître Un point de terminaison est tout appareil à distance accédant à votre réseau d'entreprise. Cela peut inclure des téléphones, des ordinateurs portables, des tablettes, des montres ou tout autre appareil informatique mobile. [...]

By |October 8, 2020|Categories: Business, Blog|Tags: , |
Go to Top