How To Secure Your Mobile Device

The landscape of cybercrime is constantly changing and growing as hackers seek out new ways to make money. Researchers are constantly finding evidence that malicious activities and software are growing. Use a local file to keep passwords and use encrypted zip with password. (ex: 7zip) 7-Zip is an open source software used to compress or […]

Read More »

The Growing Threat of Cyberattacks

As much as cyber-attacks occur with greater frequency and intensity around the world. many either go unreported or are under-reported, leaving the public with a false sense of security about the threat they pose and the lives and property they impact. NB: Organizations and individual should do more to secure their networks. Although prior administrations […]

Read More »

Small Businesses Are Prime Targets For Hackers!

The fact of the matter is, bouncing back from a cyber-attack is no easy feat. It is extremely expensive and damaging for businesses worldwide especially small businesses who are the preferred targets for those who seek to steal information. Nearly 50 per cent of small businesses have experienced a cyber-attack and that’s a major issue given […]

Read More »

Cognoscenti – The Security Configuration Time Machine

Cognoscenti provides Continuous Configuration Management and a unique “Time Machine” look and feel to configuration management. Cognoscenti drives the required analytics and data needed to quickly achieve NIST-800-171 compliance. This enables our customers to obtain detailed configuration settings and changes. The discussion below addresses section 3.4 of the NIST standards. Cognoscenti, in addition to CCG’s entire […]

Read More »

Your Phone becomes a Security Monitoring Station

Enlists the power and security of CCG software data at your fingertips, anytime, anywhere. The data and understanding of your environment is great. But it’s essential to obtain a full understanding when you are not at work. During an alert or heightened event, getting detailed, accurate information is critical. CCG provides protection of all portable […]

Read More »

Canfield CyberDefense Group LLC Receives 2017 Best of Olney Award

FOR IMMEDIATE RELEASE Olney Award Program Honors Achievement OLNEY May 2, 2017 – Canfield CyberDefense Group LLC has been selected for the 2017 Best of Olney Award in the CyberSecurity Services category by the Olney Award Program. Each year, the Olney Award Program identifies companies that have achieved exceptional marketing success in their local community […]

Read More »

Humanistic Intellect allowing Phen to manage security compliance.

Phen has been integrated and educated on security application monitoring. Phen makes running system scans more efficient and reduces “run away” security processing. Phen has a variety of methods both taught and learned. This self-gained knowledge is used to make the system security processing more efficient, avoid extensive, unnecessary network noise, and minimize the effects on a system’s […]

Read More »

Top