Articles by tag
Small Business Cybersecurity Myths
Small Business Cybersecurity myths and mistakes can destroy a business. Phishing attempts, Potentially Unwanted Programs, and Malware do not differentiate between a small business and a large enterprise. Once infected, a business is at risk – regardless of size. Understanding Cybersecurity Myths The risks posed by cyber attacks are impossible to overlook. From recent attacks on pipelines, to breaches at [...]
Small Businesses Need Software Updates
Software updates and patches are frequently avoided by small and medium business owners. These critical updates are thought to take up too much time to download and install, while they offer little business value. Software Updates Offer More Than New Functionality When it comes to saving time, Small and Medium Business owners develop their own unique tactics. One that [...]
The Human Factor: The Hidden Problem of Cybersecurity
Humans are a significant factor contributing to data breaches. While cybersecurity is usually treated as a technology problem, 88% of data breaches are the result of human error. Human Factor in Cybersecurity The human factors in cybersecurity are actions or events that result in a data breach. These factors largely result from a lack of awareness, negligence, or inappropriate access [...]
WFH Cybersecurity Best Practices for SMEs
WFH cybersecurity best practices are virtually non-existent in 49 percent of businesses. The sudden shift to remote working in early 2020 caught many businesses off guard, with most businesses prioritizing ‘getting things done’ over IT security. WFH Cybersecurity Threats Continue to Grow Working from Home (WFH) suddenly became the new normal at the beginning of the pandemic. According to many [...]
What is an Incident Response Plan: Basic Guidelines for SMEs
An incident response plan provides detailed steps for crisis management in the face of a cyber attack. Planning for When a Cyber Attack Strikes Incident response planning may seem like the projection of the worst-case scenario. That’s because it actually is. An incident response plan provides Small and Medium Enterprises (SMEs) with the guidelines to react and recover when a [...]
Les 3 menaces de cybersécurité auxquels les PME font face
Basé sur l'activité de surveillance de CYDEF, nous avons identifié les trois principales menaces de cybersécurité pour nos clients Qu'est-ce qu'une “Menace”? Une menace de cybersécurité met votre environnement réseau à risque de dommages. Cela inclut les terminaux (comme les appareils, les ordinateurs, etc..) et les applications (comme les comptes Microsoft 365). Nous avons identifié 3 types de menaces: [...]
The ART of Selecting a Managed Detection and Response Company
Tips for selecting a managed detection and response company based on Actionable, Relevant and Timely response criteria. Selecting a Managed Detection and Response Company is a Complex Task Cybersecurity is often difficult to understand, especially for the average business owner. These people devote their time to managing their enterprise, not studying cybersecurity tactics and trends. Unfortunately, that means these businesses may misinterpret basic [...]
La détection et réponse gérées (MDR) est critique pour les PMEs
Les outils de détection et de réponse gérés fournissent aux PME une cybersécurité très efficace face à des attaques de plus en plus fréquentes et complexes. Qu'est-ce qu’une MDR? La détection et la réponse gérées (MDR) offrent aux entreprises la capacité de détecter les menaces, de répondre aux incidents et de surveiller l'utilisation des appareils, des applications et du réseau. [...]
Why MDR is Mission Critical for SMBs
Managed Detection and Response tools provide SMBs with highly effective cybersecurity in the face of increasingly frequent and complex attacks. What is MDR? Managed Detection and Response (MDR) provides businesses with the capacity to detect threats, respond to incidents, and monitor device, app and network usage. Best of all: a third party takes responsibility for management of the tool. [...]
Risques de cybersécurité liés à une main-d’œuvre à distance
Les cybermenaces affrontent à la fois les PME et grandes entreprises tandis que la main-d'œuvre à distance maintient l'économie en vie. Chasse aux menaces avec un accent sur la sécurisation des appareils Il n’y a aucun doute que la pandémie mondiale a changé notre façon de travailler. Même les personnes employées par une entreprise travaillent seuls, utilisent de nouveaux outils et comptent sur la frontière numérique pour réussir. La tendance du travail à domicile (TAD) est devenue une réalité de la main-d'œuvre. En même [...]
Cybersecurity Risks Facing a Remote Workforce
Cyber threats face SMBs and large enterprises alike while the remote workforce keeps the economy alive. Threat Hunting with a Focus on Securing Devices There’s no disputing that the global pandemic has changed the way we work. Even those people employed by a business are working alone, using new tools, and relying on the digital frontier for success. The work-from-home trend has become [...]
Que signifie une brèche d’un poste de travail pour votre entreprise
Un guide sur les menaces et les brèches des postes de travail pour les propriétaires de petites entreprises. Trois menaces que tous les propriétaires de PME devraient connaître Un point de terminaison est tout appareil à distance accédant à votre réseau d'entreprise. Cela peut inclure des téléphones, des ordinateurs portables, des tablettes, des montres ou tout autre appareil informatique mobile. [...]