Start protecting your business today with Defense.com™
Find out more about the topics covered in our threat briefing videos
![Top tips on how to defend against ransomware Top tips on how to defend against ransomware](/assets/blog/heros/ransomware-top-tips-1c39ff893bbf3236f2d7fe6d066c349139032f6a0b829f5ef395a047d6d37e4b.jpg)
Top tips on how to defend against ransomware
Ransomware is a lucrative attack vector for cybercriminals that continues to rank amongst…
![Log4j vulnerability guidance Log4j vulnerability guidance](/assets/blog/heros/log4j-vulnerability-advice-3d4434d625b8e652f2d3b76cd9d011954b279bbb14faa44581188246a751687d.jpg)
Log4j vulnerability guidance
In December 2021, a critical vulnerability found in a Java-based software shook-up the internet and had businesses on red alert…
![Why we built Defense.com™ Why we built Defense.com™](/assets/blog/heros/why-we-built-defense-com-b7ad5e83b9e258eda3abb750bde27dfe7e0bccd9fa59c83c588549463788b9cb.jpg)
Why we built Defense.com™
Over the years we have observed how the IT security industry has served small businesses, with limited options available to effectively…
![10 things an IT manager should know about cybersecurity 10 things an IT manager should know about cybersecurity](/assets/blog/heros/10-things-an-it-manager-should-know-058ea0bedf6bd1df0a655d1d8f5d5da87c72e92c0b00c66abe343aabb2da0496.jpg)
10 things an IT manager should know about cybersecurity
As an IT manager, you’ll know that cybersecurity is a specialist subject with its own skillset, certifications, and technologies…