Test

Have you been hacked?

If you suspect or know your campaign , campaign consultant, or vendor has been hacked, click here to contact us immediately.

What we do

Every day, millions of dollars in donations are jeopardized by campaigns and organizations that have failed to implement the most basic security protocols—at every level. Candidates, campaign managers, staff, key consultants, and vendors often use their own devices with literally no common security policies.

The dangers, as we saw in the last election, are real and incidents occur at EVERY level.

Campaign Defense, Inc. provides practical instructions, training, and guidance to lower political and advocacy campaigns’ risk from cyber attacks, malware, and infiltration.

Not an IT service, CDI’s team are experienced political operatives, and we know that campaigns operate within a unique, and often ad-hoc environment that makes them particularly vulnerable.

In cases where an incident has occurred, we quarterback the response: coordinating the technical and legal experts, and working with your team to understand the next steps, both operationally, politically, and from a public relations standpoint.

[bravo_call_to_action sub_title=”Unleash your creative potential with BizOne” title=”Looking For Exclusive Digital Services?” link=”url:%23|title:Let’s%20Talk||”]

Significantly Reduce Your Risk of Hacking or a Cyber Attack and Subsequent Liability

Our Process

  • Exposure analysis of your campaign
  • Know the threat and what your campaign or organization is legally required to do
  • Customized protocols to handle sensitive data
  • Customized staff and vendor data handling procedures to reduce exposure
  • Staff training
  • IT recommendations/protocols
  • Assistance in securing necessary IT/hardware/software resources

Learn More About How to Prevent a Campaign Disaster

If Your Campaign has Been Hacked or Attacked

  • One stop shop to secure top-level legal, incident response, and data forensic services
  • Coordinated rapid response public relations services by people who know political campaigns and understand campaign dynamics

If you’ve been hacked or attacked, call this number now or email us here.

Campaigns, candidates, and consultants are exceptionally vulnerable to cyber attacks, malware and breaches.

Contributing factors

  • Limited to no-IT infrastructure
  • Key personnel and strategists working off their own computer with no private network or protocols
  • Poor handling of critical data, plans, records, and research
  • High volume of data transfer between vendors
  • No common practices

Services

[bravo_pricing][bravo_pricing_item symbol=”” title=”Level 1 Package” excerpt=”For municipal and smaller federal campaigns, including congressional races, small PACs/organizations and smaller imitative campaigns. ” social=”%5B%7B%22title%22%3A%22Basic%20threat%20assessment%20and%20exposure%20analysis%22%7D%2C%7B%22title%22%3A%22Customized%20staff%20data%20and%20cyber%20security%20protocols%22%7D%2C%7B%22title%22%3A%22Custom%20staff%20and%20contractor%20data%20handling%20agreement%20language%22%7D%2C%7B%22title%22%3A%22Vendor%20protocols%20and%20agreement%20language%22%7D%2C%7B%22title%22%3A%22Two%20hours%20of%20staff%2Fconsultant%2Fcandidate%20training%20(via%20shared%20screen)%22%7D%2C%7B%22title%22%3A%22Best%20practices%20instruction%20sheets%20%22%7D%2C%7B%22title%22%3A%22One%20hour%20of%20legal%20consultation%20provided%20by%20an%20expert%20cyber-security%20attorney%22%7D%2C%7B%22title%22%3A%22IT%20recommendations%2Fprotocols%22%7D%2C%7B%22title%22%3A%22Assistance%20in%20securing%20necessary%20IT%2Fhardware%2Fsoftware%20resources%22%7D%2C%7B%22title%22%3A%22Passwords%2Fusage%20policy%22%7D%2C%7B%22title%22%3A%22Record%20Retention%2FDestruction%20Policy%22%7D%2C%7B%22title%22%3A%22Incident%20response%20plan%22%7D%2C%7B%22title%22%3A%22BYOD%20Usage%2FPolicy%22%7D%2C%7B%22title%22%3A%22Mobile%20Device%20Usage%2FPolicy%22%7D%2C%7B%22title%22%3A%22Encryption%20Usage%2FPolicy%22%7D%2C%7B%22title%22%3A%22Review%20of%20Security%20Obligations%20to%20Donors%22%7D%2C%7B%22title%22%3A%22Security%2FConfidentiality%20Requirements%20for%20Vendors%20with%20Information%20Access%22%7D%2C%7B%22title%22%3A%22COST%3A%20Depends%20on%20the%20size%20and%20scope%20of%20your%20campaign%2Forganization%20and%20the%20kinds%20of%20records%20you%E2%80%99re%20dealing%20with.%20Please%20contact%20us%20at%20XXX-XXX-XXXX%20for%20more%20information.%22%7D%5D” color=”#969696″ link=”#”][bravo_pricing_item symbol=”” active=”active” title=”Level 2 Prep Package” excerpt=”For PACs, Political Committees, Organizations, and Multi-HQ Statewide Campaigns.” social=”%5B%7B%22title%22%3A%22Comprehensive%20threat%20assessment%20and%20exposure%20analysis%22%7D%2C%7B%22title%22%3A%22Written%20Information%20Security%20Program%20%22%7D%2C%7B%22title%22%3A%22Customized%20staff%20data%20and%20cyber%20security%20protocols%22%7D%2C%7B%22title%22%3A%22Custom%20staff%2Fcontractor%20data%20handling%20agreement%20language%22%7D%2C%7B%22title%22%3A%22Vendor%20protocols%20and%20agreement%20language%22%7D%2C%7B%22title%22%3A%22Two%20hours%20of%20staff%2Fconsultant%2Fcandidate%20training%20(via%20shared%20screen)%22%7D%2C%7B%22title%22%3A%22Best%20practices%20instruction%20sheets%20%22%7D%2C%7B%22title%22%3A%22Five%20hours%20of%20legal%20consultation%20provided%20by%20an%20expert%20cyber-security%20attorney%22%7D%2C%7B%22title%22%3A%22IT%20recommendations%2Fprotocols%22%7D%2C%7B%22title%22%3A%22Assistance%20in%20securing%20necessary%20IT%2Fhardware%2Fsoftware%20resources%22%7D%2C%7B%22title%22%3A%22Passwords%2Fusage%20policy%22%7D%2C%7B%22title%22%3A%22Incident%20response%20plan%22%7D%2C%7B%22title%22%3A%22Passcodes%20and%20Password%20Usage%2FPolicy%22%7D%2C%7B%22title%22%3A%22Cybersecurity%20Tabletop%20Exercise%22%7D%2C%7B%22title%22%3A%22Security%2FConfidentiality%20Requirements%20for%20Vendors%20with%20Information%20Access%22%7D%2C%7B%22title%22%3A%22Review%20of%20Vendor%20Agreements%22%7D%2C%7B%22title%22%3A%22Cyber%20Insurance%20Review%22%7D%2C%7B%22title%22%3A%22Quarterly%20review%20of%20protocols%20for%201%20year%22%7D%2C%7B%22title%22%3A%22COST%3A%20Depends%20on%20the%20size%20and%20scope%20of%20your%20campaign%2Forganization%20and%20the%20kinds%20of%20records%20you%E2%80%99re%20dealing%20with.%20Please%20contact%20us%20at%20XXX-XXX-XXXX%20for%20more%20information.%22%7D%5D” color=”#82b440″ link=”#”][bravo_pricing_item symbol=”” title=”Attack/Breach Triage Services” social=”%5B%7B%22title%22%3A%22Single%20point%20of%20contact%20to%20coordinate%20legal%20and%20incident%20response%20teams%2C%20including%20data%20forensics%2C%20ransomware%20negotiations%2C%20and%20breach%20assessment%22%7D%2C%7B%22title%22%3A%22Rapid%20response%20public%20relations%20and%20incident-related%20campaign%20strategy%22%7D%5D”][/bravo_pricing]

We’re here

Keep away from people who try to belittle your ambitions Small people always do that but the really great Friendly.

Postal Adress: 198 West 21th Street, Miami Beach,FL 33139

Phone: (954) 333-3333

Email: info@campaigndefense.com

 

Contact Us