Defendify’s article on how businesses can use their strong cybersecurity program as a competitive business advantage was recently published on Business.com. And it’s even more relevant for cybersecurity providers – read our take on using your own cybersecurity posture to differentiate your business, and be sure to check out the original article on Business.com.
As a cybersecurity provider, you know the importance of setting your customers up with top-notch training, services, and technology products to protect against modern threats and improve cybersecurity posture.
But it can be tough to know what to evaluate – and when. So just how often should you be testing your customers’ network, systems, and people?
The Defendify team loves to volunteer in the community, and our most recent activity was at the Ronald McDonald House. The team stepped out of the office and into the kitchen to prepare a homemade meal for families staying at the local House right in our backyard in Portland, Maine.
While cybersecurity should be part of every employee’s job, some roles naturally carry more responsibility—Management and IT are two that certainly come to mind.
At the same time, so many elements of cybersecurity are truly human-centric, making it so important to consider the key role HR plays in keeping everyone safe and sound. The masters of employee matters have a few tricks up their sleeve – so how can business leaders lean on HR to help build a effective cybersecurity program and culture?
Defendify is proud to announce their support of Computer Science for Maine (CS4ME) as a business member. They join local and national organizations in an effort to ensure that computer science is a subject area offered to all Maine K-12 students.
Basketball fan or not, March Madness is a springtime staple in friendly competition. With the rise of online brackets, it can be a great way to connect with friends and family for a little fun. So, when a friend sends you a bracket invitation in the middle of the week, you probably want to check it out right away!
The average worker spends six paid hours at work building their bracket, checking scores and rankings, and watching the games.
Defendify’s article on systems integrators’ next steps towards cybersecurity was recently published in Security Business Magazine. Read our short introduction below, then check out the full article here.
Defendify’s article on how to get started in cybersecurity – and who to work with – was recently published on Business.com. We’ve introduced the article here, but don’t forget to check out the full article on Business.com.
March 8th is International Women’s Day: a global day celebrating the social, economic, cultural and political achievements of women and marking a call to action for accelerating gender parity. This year’s theme is #BalanceForBetter, aiming for gender balance throughout the workplace, boardroom, government, and more.
Gender balance in cybersecurity isn’t simply a women's issue – it’s also a crucial business issue.
Defendify recently sponsored and attended the National Systems Contractors Association’s (NSCA) Business & Leadership Conference (BLC). Held in Tampa, Florida February 27-March 1, 2019, the BLC provided integration firm leaders with a new level of business insight, camaraderie, and innovation, and helped them improve sales and leadership skills.
Defendify co-founder Rob Simopoulos was recently welcomed as keynote speaker at the TechSec Solutions New Technology Conference, held February 25-26 in Delray Beach, Florida where the theme was Securing a Connected World.
While it may be cold outside, phishing remains the hottest attack vector in business: Over 90% of all successful cyberattacks are said to start with a “phishing” email. And these attacks have become far more advanced throughout the years, with the potential to fool even the most vigilant.
With this cold truth in mind, what should you be on the lookout for?
Defendify hosted a cybersecurity awareness workshop for Small Business with SCORE Portland on February 19th in Portland, Maine. Like other workshops put on by the group, it was free to attend and aimed to provide information relevant and useful to Small Business.
Picture this: You’re the finance manager at a fifty-person manufacturing firm. Your best customer’s account is overdue – unusual, as they typically pay in full. Your customer, however, insists they’ve already paid and presents proof from the bank. So why didn’t you receive the payment?
Business Email Compromise (BEC) has cost businesses over $12.5 billion since 2013, and it’s a trend on the rise with a 136% increase in losses from 2016 to 2018.
Defendify is proud to announce several female team members will join the Day of Shecurity on Friday, February 22nd. Held at the Federal Reserve Bank in Boston, MA, the Day of Shecurity is a one-day, women-only conference advocating for the inclusion of women and diversification of cybersecurity.
Data Privacy Day is January 28th, and it’s a great opportunity to evaluate how you handle and store your company’s sensitive data. Cloud storage is a very popular method: 63% of small businesses use the cloud to store their company data and files, and that number appears to be on the rise. But as with most technology, it comes with risk. So what can you do to ensure that your – and your customers’ – data is kept private?
Having an effective cybersecurity posture requires vision and support from business leaders and often builds out of the natural relationship that runs between cybersecurity and technology. We discuss the topic in our recent article on Business.com. We’ve included an introduction and summary below, but be sure to read the full article here.
Defendify’s co-founder Rob Simopoulos spoke on cybersecurity awareness at KMA Human Resources Consulting’s Breakfast Brief series on January 15th in Falmouth, Maine. KMA’s Breakfast Briefs bring together employers, subject matter experts, and HR professionals throughout the year to learn and share information on a variety of HR-related topics.
You may recall the old Benjamin Franklin axiom, “an ounce of prevention is worth a pound of cure.” Well, it’s true, for you and for your computer. As flu season is upon us, we remind you to protect your business from getting a “bad cold” by paying extra attention to its immune system.
We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute making that goal a reality.
This time of year, the gyms are packed – but don’t let that discourage you! You can increase your cyber-strength from the comfort of your desk chair.
By this time of year, Santa has nearly wrapped up his list, but have you started yours? We’re all busy and no stranger to lists when it comes to getting things done efficiently and completely. You probably have a list for your gifting, a grocery list for the big family meal, and even a to-do list of critical tasks to finish at the office before you head home for the holidays. This year, consider adding just one more list to your arsenal: A cybersecurity checklist is one quick way to see if your company’s cybersecurity program is naughty or nice.
Our article on how to identify and avoid holiday phishing attacks at work was recently published on Business.com. We have included a summary and introduction in our post, but don’t miss the full article here.
Cyber Monday did not disappoint this year: Americans spent a record-breaking $6.59 billion online, up 16.8% from last year.
With the pressure on to snap up those deals before the end of the day, some are tempted to take a quick peek at their personal inbox or favorite shopping sites while at work. Seems harmless, but what we don’t always consider are the cybersecurity risks involved when employees use work computers for personal activities.
Your Thanksgiving table is set: turkey, stuffing, and all the fixings. After many years of experience, you know to expect the unexpected and are as prepared as can be.
In business, we set the table for strong cybersecurity by having multiple layers of ongoing defense. But what we don’t always plan for is the end-of-day cleanup: in the unfortunate case of a breach or incident, how does the company respond?
Using a personal phone, computer, tablet for work is called Bring Your Own Device (BYOD). Most of us are no stranger to the concept, in fact, 64% of all employees report using a personal smartphone for work.
Companies allow personal devices because it’s convenient for the employee and, on the surface, seems to save money. But BYOD can be BYODangerous, so it’s important to closely consider the potential hazards.
We were recently published on Business.com, discussing how cybersecurity isn’t one person’s responsibility. Everyone in the organization is a cyberdefender and needs to be on board to build a genuine culture of cybersecurity. We’ve included a summary and introduction below, but you can check out the full article on Business.com.