OtherPress Release We are happy to announce that Canfield CyberDefense Group, has been approved to be a Certified Third-party Assessor Organization (C3PAO).Olumide AkinwekomiAugust 2, 2021
Continuous Risk Assessment and Information Technology (IT) Environment’s Health Other Continuous Risk Assessment and Information Technology (IT) Environment’s Health Every organization, regardless of its mission statement or business operating sector, has its own risk profile. Each organization should carry…Olumide AkinwekomiJuly 28, 2021
Defending Against the Current Russian Cyber Threats AI Cybersecurity Software ProductOtherThreat Post Defending Against the Current Russian Cyber Threats The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory about…Olumide AkinwekomiMay 17, 2021
How Are You Prioritizing Resilience in the Cyberspace? Breaches and IncidentsOther How Are You Prioritizing Resilience in the Cyberspace? Cyber resilience is an Enterprise's ability to plan, adapt, and recover when cyberattacks occur. If an Enterprise can protect itself…Olumide AkinwekomiFebruary 18, 2021
Warning on VPN Vulnerability Other Warning on VPN Vulnerability As the organization adapts to Coronavirus, there is a spike in remote work. Organizations are required to connect to remote…Olumide AkinwekomiOctober 28, 2020
CYBERSECURITY IN THIS DISPENSATION Other CYBERSECURITY IN THIS DISPENSATION In the last few years, the cybersecurity practice force is changing speedily, and the impact of this test becomes more…Olumide AkinwekomiAugust 3, 2020
Critical Flaws of Zoom Video Conferencing Software that are Prone to Attackers Other Critical Flaws of Zoom Video Conferencing Software that are Prone to Attackers Many individuals have resorted to using Zoom, especially since the beginning of this pandemic which has created restrictions in schools,…Olumide AkinwekomiJune 8, 2020
Impersonation Attacks on Microsoft Teams Other Impersonation Attacks on Microsoft Teams Some Team users have experienced two different attacks by phishing on Office 365 logins. A compelling cyber threat that imitates…Olumide AkinwekomiMay 7, 2020
Crush All Cyber Attacks with CCG CheckMate. Other Crush All Cyber Attacks with CCG CheckMate. Are your networks and systems well protected? Are you certain your systems are not vulnerable to hackers? Do you possess…Olumide AkinwekomiApril 29, 2020
Why Traffic Capture is very critical when it comes to Network Security Monitoring Other Why Traffic Capture is very critical when it comes to Network Security Monitoring Traditional security controls are insufficient to protect from cyberattacks in the digital domain, compelling organizations to adopt a Zero Trust…Olumide AkinwekomiApril 20, 2020