fbpx
Boyce, VA 22620
540.850.4226
contact@db-c2.com

Month: October 2020

The Home Computer

The Home Computer is for the most part, thought of as a portal to information and shopping. It is because of this and that they are every day appliances we use, security tends to be put aside. In todays reality of remote working the home computer is a very dangerous weapon. A weapon that can…
Read more

ransomware

Cybersecurity Awareness Month Tip #3

This is a quick and simple one that hopefully we all know but needs to be said. Whether email, text(sms) or telephone message think before responding. Use the 20 second rule. Read, Examine, decide. <<<<< Read about it there Hackers know you. There should be no doubt about that. Everyone is on social media and…
Read more

How to Protect Your Business From Phishing

Unless you did not know, Phishing is the most used form of hacking there is. So what are you doing to protect your business from phishing attacks. If the answer is nothing you are setting yourself up for a huge financial nightmare that could easily shutter your business. In fact over 60% of small businesses…
Read more

My Cat is a Hacker.

Yep, you read it right. My cat is a hacker. Well kinda. He is more like of a social engineering con man, which in the tech world would be also known as Human Hacking. I will tell you the story in a minute but first lets discover what social engineering is. Basically it is using…
Read more

Strategy

The Biggest Security Threat to Small Business and How to Fix It

What is the biggest security threat to small businesses today. I will let you know right now that most business owners believe it is getting hacked. In a sense that is true. But often the idea of being hacked is misrepresented in our minds as some guy in a hoodie behind a laptop writing code…
Read more

What is Shadow Tech and Why it matters to your business.

What is Shadow Tech and Why it matters to your business. Shadow Tech is fancy scary word for unauthorized devices being attached and used on your systems. It comes in many forms. Everything from thumb drives, ipods and phones plugged into a users computer to people bringing in their own WiFi routers and plugging them…
Read more

Cybersecurity by the Numbers

Top 8 Cybersecurity Myths DEBUNKED Every day I get people using excuses to justify why they have not implemented a Cybersecurity Defense Program. Below is a list of the top reasons that are stated. Free Download – cb_cybersecurity-myths-infographic  

Windows 7 End of Life

Cybersecurity Awareness Month Tips #2

Cybersecurity Awareness Month Tips #2 With over 30 billion devices connected to the internet and counting, you may have heard the term, Internet of Things (IoT) – devices that perform various tasks through internet connectivity. These devices are becoming increasingly common in many households, including digital assistants, smart thermostats, doorbells and printers. While IoT devices…
Read more

Zerologon

A critical vulnerability was found that allows hackers to take over Windows Domain Controllers using a Netlogon EoP vulnerability that was found mid September. The vulnerability allows even unskilled hackers to take over a Domain Controller and essentially an entire system. It is recommended that any Windows Domain Controllers be taken OFFLINE and Patched immediately.…
Read more

US Govt Takes Hard Line on Victims of Ransomware

US Govt takes Hard Line on Victims of Ransomware that Pay Up On October 1, 2020 the US Dept of Treasury released an advisory regarding payments to cybercriminals. “Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments”Date: October 1, 2020 The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing this…
Read more