Basketball fan or not, March Madness is a springtime staple in friendly competition. With the rise of online brackets, it can be a great way to connect with friends and family for a little fun. So, when a friend sends you a bracket invitation in the middle of the week, you probably want to check it out right away!
The average worker spends six paid hours at work building their bracket, checking scores and rankings, and watching the games.
Defendify’s article on systems integrators’ next steps towards cybersecurity was recently published in Security Business Magazine. Read our short introduction below, then check out the full article here.
Defendify’s article on how to get started in cybersecurity – and who to work with – was recently published on Business.com. We’ve introduced the article here, but don’t forget to check out the full article on Business.com.
March 8th is International Women’s Day: a global day celebrating the social, economic, cultural and political achievements of women and marking a call to action for accelerating gender parity. This year’s theme is #BalanceForBetter, aiming for gender balance throughout the workplace, boardroom, government, and more.
Gender balance in cybersecurity isn’t simply a women's issue – it’s also a crucial business issue.
Defendify recently sponsored and attended the National Systems Contractors Association’s (NSCA) Business & Leadership Conference (BLC). Held in Tampa, Florida February 27-March 1, 2019, the BLC provided integration firm leaders with a new level of business insight, camaraderie, and innovation, and helped them improve sales and leadership skills.
Defendify co-founder Rob Simopoulos was recently welcomed as keynote speaker at the TechSec Solutions New Technology Conference, held February 25-26 in Delray Beach, Florida where the theme was Securing a Connected World.
While it may be cold outside, phishing remains the hottest attack vector in business: Over 90% of all successful cyberattacks are said to start with a “phishing” email. And these attacks have become far more advanced throughout the years, with the potential to fool even the most vigilant.
With this cold truth in mind, what should you be on the lookout for?
Defendify hosted a cybersecurity awareness workshop for Small Business with SCORE Portland on February 19th in Portland, Maine. Like other workshops put on by the group, it was free to attend and aimed to provide information relevant and useful to Small Business.
Picture this: You’re the finance manager at a fifty-person manufacturing firm. Your best customer’s account is overdue – unusual, as they typically pay in full. Your customer, however, insists they’ve already paid and presents proof from the bank. So why didn’t you receive the payment?
Business Email Compromise (BEC) has cost businesses over $12.5 billion since 2013, and it’s a trend on the rise with a 136% increase in losses from 2016 to 2018.
Defendify is proud to announce several female team members will join the Day of Shecurity on Friday, February 22nd. Held at the Federal Reserve Bank in Boston, MA, the Day of Shecurity is a one-day, women-only conference advocating for the inclusion of women and diversification of cybersecurity.
Data Privacy Day is January 28th, and it’s a great opportunity to evaluate how you handle and store your company’s sensitive data. Cloud storage is a very popular method: 63% of small businesses use the cloud to store their company data and files, and that number appears to be on the rise. But as with most technology, it comes with risk. So what can you do to ensure that your – and your customers’ – data is kept private?
Having an effective cybersecurity posture requires vision and support from business leaders and often builds out of the natural relationship that runs between cybersecurity and technology. We discuss the topic in our recent article on Business.com. We’ve included an introduction and summary below, but be sure to read the full article here.
Defendify’s co-founder Rob Simopoulos spoke on cybersecurity awareness at KMA Human Resources Consulting’s Breakfast Brief series on January 15th in Falmouth, Maine. KMA’s Breakfast Briefs bring together employers, subject matter experts, and HR professionals throughout the year to learn and share information on a variety of HR-related topics.
You may recall the old Benjamin Franklin axiom, “an ounce of prevention is worth a pound of cure.” Well, it’s true, for you and for your computer. As flu season is upon us, we remind you to protect your business from getting a “bad cold” by paying extra attention to its immune system.
We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute making that goal a reality.
This time of year, the gyms are packed – but don’t let that discourage you! You can increase your cyber-strength from the comfort of your desk chair.
By this time of year, Santa has nearly wrapped up his list, but have you started yours? We’re all busy and no stranger to lists when it comes to getting things done efficiently and completely. You probably have a list for your gifting, a grocery list for the big family meal, and even a to-do list of critical tasks to finish at the office before you head home for the holidays. This year, consider adding just one more list to your arsenal: A cybersecurity checklist is one quick way to see if your company’s cybersecurity program is naughty or nice.
Our article on how to identify and avoid holiday phishing attacks at work was recently published on Business.com. We have included a summary and introduction in our post, but don’t miss the full article here.
Cyber Monday did not disappoint this year: Americans spent a record-breaking $6.59 billion online, up 16.8% from last year.
With the pressure on to snap up those deals before the end of the day, some are tempted to take a quick peek at their personal inbox or favorite shopping sites while at work. Seems harmless, but what we don’t always consider are the cybersecurity risks involved when employees use work computers for personal activities.
Your Thanksgiving table is set: turkey, stuffing, and all the fixings. After many years of experience, you know to expect the unexpected and are as prepared as can be.
In business, we set the table for strong cybersecurity by having multiple layers of ongoing defense. But what we don’t always plan for is the end-of-day cleanup: in the unfortunate case of a breach or incident, how does the company respond?
Using a personal phone, computer, tablet for work is called Bring Your Own Device (BYOD). Most of us are no stranger to the concept, in fact, 64% of all employees report using a personal smartphone for work.
Companies allow personal devices because it’s convenient for the employee and, on the surface, seems to save money. But BYOD can be BYODangerous, so it’s important to closely consider the potential hazards.
We were recently published on Business.com, discussing how cybersecurity isn’t one person’s responsibility. Everyone in the organization is a cyberdefender and needs to be on board to build a genuine culture of cybersecurity. We’ve included a summary and introduction below, but you can check out the full article on Business.com.
This week’s National Cybersecurity Awareness Month (NCSAM) theme is “Securing Our Nation’s Critical Infrastructure.” The 16 critical infrastructure sectors are designated by the Department of Homeland Security as crucial to the nation’s safety, security, and wellbeing.
Cyberattacks to critical infrastructure are often very large in scale, could pose physical safety concerns, and may have catastrophic consequences.
Anyone can be a target of a cyberattack that can affect the whole organization. The good news is, we can all be cyber-defenders, taking responsibility for cybersecurity by being cyber-aware and following our organization’s guidelines.
In addition to overarching cybersecurity responsibility, all departments face different challenges and threats. And each has unique opportunities to protect their organization.
October is National Cybersecurity Awareness Month (NCSAM), and this week’s theme is “Millions of Rewarding Jobs: Educating for a Career in Cybersecurity.” Cybersecurity is an exciting and booming field currently experiencing a talent shortage. It’s estimated that by 2021, there will be 3.5 million cybersecurity job openings, and in a field maintaining a 0% unemployment rate, the reality is that cybersecurity jobs aren’t all hyper-technical. This NCSAM, we wanted to inspire some thinking around careers through the lens of multiple layers of defense: Foundation, Culture, and Technology.
The Internet of Things, or IoT, refers to the network of physical products and devices that connect to the Internet. Common household IoT devices include Internet-connected thermostats, alarm systems, and televisions, and even kitchen appliances. By 2020, there will be over 30 million IoT devices worldwide.
There is no doubt about it, “smart” devices have become a part of everyday life. But the thing we have to remember is: If it connects to the Internet, it has the potential to be hacked.
This October is a big month in the cybersecurity world – it’s the 15th annual National Cybersecurity Awareness Month, led by the National Cyber Security Alliance and the Department of Homeland Security. National Cyber Security Awareness Month (NCSAM) was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.
Defendify is proud to be a NCSAM Champion again this year, and to promote cybersecurity awareness in October and every month.