Information theft has led to the compromise of intellectual property, credit card information, electronic funds, identity theft, and a host of other negative consequences. Electronic theft, or cyber crime affects individuals, corporations and government entities. Breaches are routinely perpetrated by, ill intended employees, ex-employees, organized crime groups, and foreign government sponsored espionage groups.


While government mandates are driving organizations to address compliance initiatives, the security of many data assets has seen limited improvement. Many organizations are struggling quietly having been victimized by information theft and are seeking to understand the potential consequences and methods to recovery. Information Defense helps organizations to identify threats to intellectual property and sensitive data assets along with the necessary measures to prepare for, prevent, and respond to cyber crime and data theft.


We assist organizations to:


  • Secure data environments through technical measures
  • Secure data through improved information security process and procedures
  • Respond to and recover from information security breaches
  • Build incident response and data forensic teams
  • Model and measure risk to information assets and intellectual property
  • Address compliance initiatives such as PCI, Red Flags Rule and others
Our methods follow a comprehensive risk based approach through our Information Security Management Model™ (ISMM). The protection of information assets within the workplace is a significant issue. Our approach enables organizations to Prepare, Prevent and Respond to cyber crime.


Latest Cyber & Information Security News

Why cyber security is important in 2013

Today more than at any time in the past we are committed to using the Internet for almost all our business and social needs. Never... 

Comments on zDefender – Android anti-malware software

A ComputerWorld  Read More →

SecureWorld Mobile Device Security Presentation

Thanks to the guys at SecureWorld who invited me to speak on mobile device management (MDM) and mobile device security yesterday! The... 

Featured Videos

How Rootkits Are Threatening Smartphone Security

Think your cell phone conversations are secure? ┬áThink again….computer scientists at Rutgers University have shown how a familiar type of personal computer security threat can now attack new generations of smart mobile phones,