culture

USB drives are extremely popular in business and in personal use, making it easy to store and transfer files. They’re inexpensive, portable, and can hold a ton of information in various file formats.

Read More →

Defendify’s article on techniques to keep your data and company safe while you’re out of the office was recently published on Business.com. We’ve shared some insight and tips on coaching your customers through travel best practices here, and don’t

Read More →

When you think “cybersecurity threat,” what comes to mind? A hoodie-clad hacker in a basement breaking into the network or an army of cyberattackers sending ransomware at other unsuspecting nations? Probably. But the truth is, many incidents can

Read More →

We use mobile phones for so much more than talking and texting – half of all web traffic comes from mobile devices, and there are apps for everything from social media to transportation and beyond. Mobile devices appear near-constantly in the

Read More →

Defendify’s article on rolling out a Clean Desk Policy and how it relates to protecting sensitive data was recently published on Business.com. Read our tips for cybersecurity providers here, and don’t miss the full article on Business.com.

Read More →

Nowadays, a password – no matter how formidable – just isn’t enough to protect the throne. With all the critical information we store online, Two-Factor Authentication adds an important security step to help your devices confirm that the person

Read More →

Defendify Co-Founder Rob Simopoulos recently attended the Maine Insurance Agents Association (MIAA) Annual Convention to speak on cybersecurity awareness for insurance agents and their businesses. Held in South Portland, Maine April 29-30, the

Read More →

While cybersecurity should be part of every employee’s job, some roles naturally carry more responsibility—Management and IT are two that certainly come to mind.

Read More →

While it may be cold outside, phishing remains the hottest attack vector in business: Over 90% of all successful cyberattacks are said to start with a “phishing” email. And these attacks have become far more advanced throughout the years, with the

Read More →