Having an effective cybersecurity posture requires vision and support from business leaders and often builds out of the natural relationship that runs between cybersecurity and technology. We discuss the topic in our recent article on Business.com. We’ve included an introduction and summary below, but be sure to read the full article here.
You may recall the old Benjamin Franklin axiom, “an ounce of prevention is worth a pound of cure.” Well, it’s true, for you and for your computer. As flu season is upon us, we remind you to protect your business from getting a “bad cold” by paying extra attention to its immune system.
We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute making that goal a reality.
This time of year, the gyms are packed – but don’t let that discourage you! You can increase your cyber-strength from the comfort of your desk chair.
By this time of year, Santa has nearly wrapped up his list, but have you started yours? We’re all busy and no stranger to lists when it comes to getting things done efficiently and completely. You probably have a list for your gifting, a grocery list for the big family meal, and even a to-do list of critical tasks to finish at the office before you head home for the holidays. This year, consider adding just one more list to your arsenal: A cybersecurity checklist is one quick way to see if your company’s cybersecurity program is naughty or nice.
Our article on how to identify and avoid holiday phishing attacks at work was recently published on Business.com. We have included a summary and introduction in our post, but don’t miss the full article here.
Cyber Monday did not disappoint this year: Americans spent a record-breaking $6.59 billion online, up 16.8% from last year.
With the pressure on to snap up those deals before the end of the day, some are tempted to take a quick peek at their personal inbox or favorite shopping sites while at work. Seems harmless, but what we don’t always consider are the cybersecurity risks involved when employees use work computers for personal activities.
Your Thanksgiving table is set: turkey, stuffing, and all the fixings. After many years of experience, you know to expect the unexpected and are as prepared as can be.
In business, we set the table for strong cybersecurity by having multiple layers of ongoing defense. But what we don’t always plan for is the end-of-day cleanup: in the unfortunate case of a breach or incident, how does the company respond?
Using a personal phone, computer, tablet for work is called Bring Your Own Device (BYOD). Most of us are no stranger to the concept, in fact, 64% of all employees report using a personal smartphone for work.
Companies allow personal devices because it’s convenient for the employee and, on the surface, seems to save money. But BYOD can be BYODangerous, so it’s important to closely consider the potential hazards.
We were recently published on Business.com, discussing how cybersecurity isn’t one person’s responsibility. Everyone in the organization is a cyberdefender and needs to be on board to build a genuine culture of cybersecurity. We’ve included a summary and introduction below, but you can check out the full article on Business.com.
This week’s National Cybersecurity Awareness Month (NCSAM) theme is “Securing Our Nation’s Critical Infrastructure.” The 16 critical infrastructure sectors are designated by the Department of Homeland Security as crucial to the nation’s safety, security, and wellbeing.
Cyberattacks to critical infrastructure are often very large in scale, could pose physical safety concerns, and may have catastrophic consequences.
Anyone can be a target of a cyberattack that can affect the whole organization. The good news is, we can all be cyber-defenders, taking responsibility for cybersecurity by being cyber-aware and following our organization’s guidelines.
In addition to overarching cybersecurity responsibility, all departments face different challenges and threats. And each has unique opportunities to protect their organization.
October is National Cybersecurity Awareness Month (NCSAM), and this week’s theme is “Millions of Rewarding Jobs: Educating for a Career in Cybersecurity.” Cybersecurity is an exciting and booming field currently experiencing a talent shortage. It’s estimated that by 2021, there will be 3.5 million cybersecurity job openings, and in a field maintaining a 0% unemployment rate, the reality is that cybersecurity jobs aren’t all hyper-technical. This NCSAM, we wanted to inspire some thinking around careers through the lens of multiple layers of defense: Foundation, Culture, and Technology.
The Internet of Things, or IoT, refers to the network of physical products and devices that connect to the Internet. Common household IoT devices include Internet-connected thermostats, alarm systems, and televisions, and even kitchen appliances. By 2020, there will be over 30 million IoT devices worldwide.
There is no doubt about it, “smart” devices have become a part of everyday life. But the thing we have to remember is: If it connects to the Internet, it has the potential to be hacked.
This October is a big month in the cybersecurity world – it’s the 15th annual National Cybersecurity Awareness Month, led by the National Cyber Security Alliance and the Department of Homeland Security. National Cyber Security Awareness Month (NCSAM) was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.
Defendify is proud to be a NCSAM Champion again this year, and to promote cybersecurity awareness in October and every month.
The Defendify team loves to make a difference, and one way we do so is volunteering as a group. We recently took some time out of our workday to pitch in at the Preble Street Resource Center soup kitchen. The Resource Center is located right around the corner from the Defendify office, making the volunteer experience that much more meaningful.
We were recently published on Business.com, discussing the importance of cybersecurity for Small Business and how to prioritize it organizationally. We’ve included a summary and introduction below, but you can check out the full article on Business.com.
School season is in full swing and the kids are back to learning. With all that hard work, they’re getting pretty smart, but they’re not the only ones. The rise of machine learning means computers are also honing their skills, especially when it comes to cybersecurity.
Artificial Intelligence (AI) in cybersecurity can be complicated, but it’s also a valuable resource in many areas, from detecting intruders to preventing attacks. While AI may seem overwhelming for Small Business, there’s actually a fairly simple way to make use of it as a part of your cybersecurity arsenal in the form of Next-Generation Antivirus software.
It’s September and many students are starting fall internships while recent graduates are diving into great new jobs. Young professionals are on the scene! Millennials recently became the largest generation in the U.S. labor market, and Generation Z is just beginning to intern and graduate college.
Young professionals may understand basic cybersecurity concepts simply from growing up surrounded by technology. But cybersecurity extends far beyond technology and becomes even more mission-critical when applied to the workplace—especially for those coming in for the first time.
Many historic New England towns once featured a profitable commercial whaling industry. Fortunately, that has been banned in most parts of the world, replaced by whale watching trips popular with tourists and locals alike.
The humpbacks might be off the hook, but there is a new kind of “whaling” on the scene. It’s a subset of phishing aimed at a high-level targets such as small business owners and executives. And it’s only building in popularity – whaling attacks increased an estimated by 200% in 2017.
Defendify has announced that they have become a Champion of National Cybersecurity Awareness Month (NCSAM) 2018. They will be joining a growing global effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals to promote the awareness of online safety and privacy.
It’s hot out there and the sun, sand, and salt water are calling our names. Summer is a great time to relax, so cybersecurity might not be top of mind. But, believe it or not, a safe and successful day at the beach happens to have a lot in common with a safe and successful cybersecurity posture.
Check out these three tips for keeping summertime beach season, not breach season.
Cybersecurity can seem complicated and expensive, especially for Small Business. It leaves most owners and managers wondering where they stand against the growing attacks they read about daily and not knowing how they can protect themselves.
Defendify changes all that. The new, web-based platform—a SaaS model—is designed and built exclusively for companies with 500 or fewer employees. It's an all-in-one solution that's easy to implement and affordable yet comprehensive, powerful, and scalable.
After hearing about Defendify’s mission to make cybersecurity possible for Small Business and the company’s rapid startup growth, Program Instructor Chris Dube eagerly invited Co-Founders Andrew Rinaldi and Rob Simopoulos to tell their story to 53 aspiring international entrepreneurs at this year’s ‘TrepCamp Boston.
Andrew and Rob were quick to accept, welcoming opportunities to give back and help other entrepreneurs by sharing the trials and tribulations of their own journey.
It’s the end of a long workday – time to head home! Pack up your things, kill the lights, and latch the front door with Velcro. Sounds ridiculous, right?
We go to great lengths to prevent physical break-ins, but unfortunately, many passwords used today are about as secure as that Velcro. Understand your enemy and learn tips to create secure passphrases.
Ransomware is really a new take on an old crime. Ransomware is a type of malicious software that hackers install to encrypt your data and files, rendering systems unusable until you pay the ransom demand.
Believe it or not, demands aren’t always egregious. Paying the ransom is only a fraction of the true cost. Hidden costs are what really hurt, like downtime and brand damage.
They’re computer whizzes, trusted advisors, and downright magicians all at once. IT professionals are the unsung heroes that keep the company engine running. But just like the rest of us, they’re only human. Can we really expect them to take on all aspects of cybersecurity too?
We hope you had a wonderful 4th of July! Fireworks were booming, grills were blazing, and cameras were popping.
Social media is a fun and convenient way to show off your photos and connect with others, something many of us do personally and professionally. But we’re a little more hesitant today than we were last Independence Day, and starting to wonder what Privacy is and whether or not it exists anymore.