{"id":1580,"date":"2019-11-14T11:09:17","date_gmt":"2019-11-14T16:09:17","guid":{"rendered":"https:\/\/www.mikrodots.com\/?page_id=1580"},"modified":"2020-02-25T20:04:32","modified_gmt":"2020-02-26T01:04:32","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.mikrodots.com\/?page_id=1580","title":{"rendered":"So you can sleep at night."},"content":{"rendered":"<figure id=\"attachment_1783\" aria-describedby=\"caption-attachment-1783\" style=\"width: 265px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1783 size-full\" src=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/Defendify-full-logo.png\" alt=\"\" width=\"265\" height=\"42\"><figcaption id=\"caption-attachment-1783\" class=\"wp-caption-text\">By Mikrodots<\/figcaption><\/figure>\n<p><strong>Defendify by Mikrodots All-In-One Cybersecurity Platform<\/strong><br>We have partnered with Defendify to offer flexible, scalable, ongoing cybersecurity to our valued clients. Defendify is an all-in-one cybersecurity platform for Small Business that makes deploying and managing cybersecurity simple and accessible through a single pane of glass. It\u2019s a comprehensive solution that incorporates three key layers of cybersecurity:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1793 alignleft\" src=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/multiple-layers-300x143.png\" alt=\"\" width=\"300\" height=\"143\" srcset=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/multiple-layers-300x143.png 300w, https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/multiple-layers-1024x488.png 1024w, https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/multiple-layers-768x366.png 768w, https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/multiple-layers.png 1184w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<ul>\n<li><strong>Foundation<\/strong> of assessments, policies, procedures, and plans.<\/li>\n<li><strong>Culture<\/strong> of employee awareness, education, training, and institutional knowledge.<\/li>\n<li><strong>Technology<\/strong> that goes beyond traditional antivirus and firewalls.<br>Defendify is easy to understand and use, the first cybersecurity platform of its kind, made specifically for Small Business.<\/li>\n<\/ul>\n<p>For more information please visit Defendify\u2019s website: <a href=\"https:\/\/www.defendify.io\">https:\/\/www.defendify.io<\/a><\/p>\n<p>A cyberattack can shut down a business\u2019s operations for days, even weeks. Backup systems, business applications and important data sets can be compromised and be of little value in the response and recovery phases of the disaster. The aftermath of a cyberattack can wreak havoc on the company\u2019s reputation and have unforeseen legal implications and may even close the doors of your organization for good.<\/p>\n<p>At Mikrodots, we take a business first approach to security by utilizing a process to identify, detect, protect, respond and recover from a cyberattack. Today, we cannot guarantee 100% protection from an attack, incident or breach. We can guarantee that we can align business technology to security standards to attain near perfect protection and recovery capabilities. Mikrodots will work with your senior management, legal department and functional area teams and provide an audit of your risks, security gaps and current response plan as part of our cybersecurity services. Businesses require what we refer to as CIA \u2013Confidentiality, Integrity &amp; Availability of Data and Applications to run their operations.<\/p>\n<p>As part of our strategic planning, we will collaborate with your teams to identify vulnerabilities and create a proactive, tactical plan that is in compliance with best practices. We will work with your management team to establish a response plan to mitigate risks and business interruption should an incident occur. With our response plan in place, we will activate our reactive tactical \u201cRed Teams\u201d to respond and recover within the established recovery time objectives (RTOs).<\/p>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2019\/11\/MikrodotsInc.png\" alt=\"Mikrodots Inc\" class=\"wp-image-8\" width=\"380\" height=\"71\" srcset=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2019\/11\/MikrodotsInc.png 380w, https:\/\/www.mikrodots.com\/wp-content\/uploads\/2019\/11\/MikrodotsInc-300x56.png 300w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"265\" height=\"42\" src=\"https:\/\/www.mikrodots.com\/wp-content\/uploads\/2020\/02\/Defendify-full-logo.png\" alt=\"\" class=\"wp-image-1783\"\/><figcaption>By Mikrodots<\/figcaption><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity &#8211; done right, done for you.<\/p>\n","protected":false},"author":1,"featured_media":1352,"parent":1506,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/page-service.php","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-1580","1":"page","2":"type-page","3":"status-publish","4":"has-post-thumbnail","6":"entry"},"_links":{"self":[{"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/pages\/1580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1580"}],"version-history":[{"count":16,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/pages\/1580\/revisions"}],"predecessor-version":[{"id":1826,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/pages\/1580\/revisions\/1826"}],"up":[{"embeddable":true,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/pages\/1506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=\/wp\/v2\/media\/1352"}],"wp:attachment":[{"href":"https:\/\/www.mikrodots.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}