fbpx
Boyce, VA 22620
540.850.4226
contact@db-c2.com

Category: Disaster Recovery

US Govt Takes Hard Line on Victims of Ransomware

US Govt takes Hard Line on Victims of Ransomware that Pay Up On October 1, 2020 the US Dept of Treasury released an advisory regarding payments to cybercriminals. “Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments”Date: October 1, 2020 The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) is issuing this…
Read more

Recommended Wordpress Plugins

Your Choices After a Ransomware Attack

The choices of recourse you have after a ransomware attack like the one that hit in Fairfax County Public Schools last Friday are limited. There are basically two options, neither is good. The first option you will have is to refuse to pay the ransom. As stated in the disclosure of the FPCS breach, the…
Read more

Day 12 Deploy a Multi-Layer Security Strategy

Security is asymmetrical. Where businesses must plan, prepare and defend against every threat or scenario, cybercriminals only need to find a single weakness or hole in your defenses to carry out their malicious plans. Protect your data and your business by deploying multiple security strategies together as one. At DB Cybersecurity Consulting, this is our…
Read more

Strategy Day 10 Don’t Skip the Insurance

Increasing risks and threats of data breaches and ransomware, regardless of size or industry, have prompted many businesses to adopt Cyber Risk Insurance to protect themselves from catastrophic loss. Investing in a cyber insurance policy could save your business should you be the next victim. I know, buying insurance sucks. But you and I also…
Read more

Strategy Day 8 Don’t Neglect Compliance

Maintaining regulatory compliance is mandatory for many organizations. While navigating and satisfying the obligations can be complicated and stressful, achieving compliance is a critical component of having a cyber ready business. Security and privacy are integral elements of compliance. The current situation requires that many businesses to employ work from home availability to key employees.…
Read more

Strategy Day 9 Combat the Password Crisis

With over 80% of hacking-related breaches linked to weak, reused or stolen passwords*1, user credentials are emerging as the top vulnerability for businesses. Balance convenience and security by monitoring the dark web for exposed credentials, implementing multi-factor authentication, and streamlining control of password management. While many think passwords are outdated the fact remains that most…
Read more

Strategy Day 7 Continuous Network Intelligence

Knowledge is power. A critical component of cyber readiness is having on-demand insight of anomalous activities, suspicious changes, potentially harmful misconfigurations or any other malicious activities occurring internally on your network. Promptly detect and remove threats before they cause damage. I guess this is what I really like. finding bad stuff and removing or fixing…
Read more

Security Awareness Training

Strategy Day 6 Security Awareness Training

Security Awareness Training Users are the weakest link in security, given a lack of education and experience. Instituting a security awareness training program for every member of your staff will significantly reduce the probability of user-related errors and exposures. Those first two lines deserve rereading. That’s right, your employees are the biggest threat to your…
Read more

Strategy Day 5 Back Up Everything!

Data is the lifeblood of every business. Unfortunately, the risks and threats to the protection, privacy and usability of that data are endless. Follow the 3-2-1 method for backups; a minimum of three unique copies of your data, two available locally and one off-site or in the cloud. Make sure to test your backups often…
Read more

Strategy Day 4 Force Authentication

One-level security is no longer enough. Even the strongest passwords are vulnerable to theft or exposure. Requiring more than one method to authenticate user identity or access permissions can reduce or eliminate the risk of stolen or unauthorized credentials being utilized. Traditional login schemes use single factor authentication. This means using a password to gain…
Read more