Defensible Technology
Computer and Network Security
Your Protection From Cyber Security Threats
About us
Defensible Technology, founded in 2019, is a client-centric, security-first managed service and cybersecurity provider that provides comprehensive IT services and security risk analyses to small and medium-size organizations. We possess broad and deep IT and cybersecurity expertise that results from decades of diverse experience managing complex IT environments. We apply this expertise to organizations lacking significant IT budgets and/or internal resources but face the same security and technology challenges as large organizations. We combine sophisticated security risk management with focused customer service to offer a flexible, sophisticated and affordable alternative to traditional cybersecurity and managed security service providers.
- Website
-
http://www.defensible.tech
External link for Defensible Technology
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- New York
- Type
- Privately Held
- Founded
- 2020
Locations
-
Primary
48 Wall St
11 Fl
New York, 10005, US
Employees at Defensible Technology
-
Kelvin Baez
VP, Cybersecurity Operations at Defensible Technology
-
Steve Doty
CEO and Founder | IT and Cyber Security Consultant | vCISO | Senior Advisor
-
Isaac Marks
Recruiting and Sourcing on demand. We help employers accelerate hiring, slash recruitment costs, and hit company goals.
-
Glen McClain, MBA
| Cybersecurity & IT Solutions the Defensible Way |
Updates
-
We are proud to partner with organizations like regional hospitals and healthcare system providers to strengthen their cybersecurity. 💪 Recently, a Director of Information Security from a regional hospital shared how our Vulnerability Scanning as a Service (VSaaS) has been critical to their security operations. By providing detailed reporting and analysis, we help healthcare organizations save time and money, enabling them to focus on patient care while we manage the vulnerabilities. #Cybersecurity #InfoSec #Healthcare #Testimonial #Teamwork
-
🔒 𝐈𝐬 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬 𝐬𝐭𝐢𝐥𝐥 𝐫𝐞𝐥𝐲𝐢𝐧𝐠 𝐨𝐧 𝐨𝐮𝐭𝐝𝐚𝐭𝐞𝐝 𝐩𝐞𝐫𝐢𝐦𝐞𝐭𝐞𝐫-𝐛𝐚𝐬𝐞𝐝 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲? With the rise of remote work and hybrid environments, Zero Trust Network Access (ZTNA) is now a must-have. Unlike traditional security models, ZTNA continuously verifies users and limits access, offering stronger protection against evolving cyber threats. Find out why modern businesses are shifting to ZTNA and how Defensible can help implement it. 👉 Read more: https://lnkd.in/dQbKXUCq #CyberSecurity #ZTNA #ZeroTrust #RemoteWork #NetworkSecurity
Why Zero Trust Network Access (ZTNA) is a Must for Modern Businesses
defensible.tech
-
According to IBM's Data Breach Report, the healthcare sector experiences the highest average cost of a data breach ($9.77 million in 2024), ranking it the highest for the 13th consecutive year. With sensitive patient information at risk, including medical records, Social Security numbers, and financial data, the consequences of a breach can be devastating—both in terms of financial impact and damage to patient trust. It’s critical for #healthcare providers to adopt proactive security measures like encryption, Zero Trust policies, and regular vulnerability assessments. Our team is here to help healthcare organizations avoid cyber threats, secure patient data, and maintain compliance with regulations like HIPAA and HITECH. Don’t wait for a breach to happen—reach out to us today and strengthen your cybersecurity posture. #Cybersecurity #InformationSecurity #InfoSec
-
⚖️ For many SMBs, achieving #compliance can feel like a constant balancing act between meeting regulatory requirements and staying within budget. The cost of non-compliance—from fines to reputational damage—can be significant. But securing your business to meet these standards doesn’t have to drain your resources. By partnering with a security-first MSP like Defensible Technology, you can streamline your compliance efforts and ensure your business meets regulatory standards without overspending. We help SMBs implement cost-effective solutions to safeguard sensitive data and stay compliant with industry regulations. Contact us for a free consultation, and let’s find the most cost-effective way to secure your business and meet compliance standards. 📞 #Cybersecurity #MSP #SMB #InfoSec
-
We have seen a mix of reporting relationships between the MSP and their customers, and in some cases, we have functioned as a #vciso providing governance and oversight to IT MSP's.
This content isn’t available here
Access this content and more in the LinkedIn app
-
Defensible Technology reposted this
✉️ 𝐏𝐡𝐢𝐬𝐡𝐢𝐧𝐠 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 𝐚𝐫𝐞 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐦𝐨𝐫𝐞 𝐬𝐨𝐩𝐡𝐢𝐬𝐭𝐢𝐜𝐚𝐭𝐞𝐝 𝐞𝐯𝐞𝐫𝐲 𝐝𝐚𝐲. Are you and your team prepared to spot the latest tactics? Swipe through our post to see some of the most prevalent phishing techniques used over the last months and how they operate. 💡𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐢𝐬 𝐤𝐞𝐲. At Defensible Technology, our vCISO services provide tailored security awareness training to help your team recognize and avoid these threats. #cybersecurity #phishing #vCISO #securityawareness #infosec #cyberawareness
-
✉️ 𝐏𝐡𝐢𝐬𝐡𝐢𝐧𝐠 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 𝐚𝐫𝐞 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐦𝐨𝐫𝐞 𝐬𝐨𝐩𝐡𝐢𝐬𝐭𝐢𝐜𝐚𝐭𝐞𝐝 𝐞𝐯𝐞𝐫𝐲 𝐝𝐚𝐲. Are you and your team prepared to spot the latest tactics? Swipe through our post to see some of the most prevalent phishing techniques used over the last months and how they operate. 💡𝐀𝐰𝐚𝐫𝐞𝐧𝐞𝐬𝐬 𝐢𝐬 𝐤𝐞𝐲. At Defensible Technology, our vCISO services provide tailored security awareness training to help your team recognize and avoid these threats. #cybersecurity #phishing #vCISO #securityawareness #infosec #cyberawareness
-
🚨The recent breach of National Public Data, a background check company for the United States Department of Defense, exposed billions of Social Security Numbers (SSNs) and other sensitive information to hackers. In our latest #blog post, we dive into the details of this breach, explore key lessons learned, and share best practices for safeguarding your sensitive information. Read the full article here 👉 https://lnkd.in/dutk_nNK #CyberSecurity #DataBreach #SSN #DataProtection
Protecting Critical Data: Lessons from the DoD Contractor SSN Breach
defensible.tech