fbpx
Boyce, VA 22620
540.850.4226
contact@db-c2.com

Category: Remote Work

Zerologon

A critical vulnerability was found that allows hackers to take over Windows Domain Controllers using a Netlogon EoP vulnerability that was found mid September. The vulnerability allows even unskilled hackers to take over a Domain Controller and essentially an entire system. It is recommended that any Windows Domain Controllers be taken OFFLINE and Patched immediately.…
Read more

Day 12 Deploy a Multi-Layer Security Strategy

Security is asymmetrical. Where businesses must plan, prepare and defend against every threat or scenario, cybercriminals only need to find a single weakness or hole in your defenses to carry out their malicious plans. Protect your data and your business by deploying multiple security strategies together as one. At DB Cybersecurity Consulting, this is our…
Read more

Strategy Day 11 Reduce Supply Chain Vulnerabilities

Nearly two-thirds of firms (65%) have experienced cyber-related issues in their supply chain in the past year1. As a part of your cyber readiness plan, you must deploy protocols to evaluate and monitor the security of your supplier networks and third-party vendors. This is a really overlooked aspect of your cybersecurity plan. Mostly because it…
Read more

Strategy Day 10 Don’t Skip the Insurance

Increasing risks and threats of data breaches and ransomware, regardless of size or industry, have prompted many businesses to adopt Cyber Risk Insurance to protect themselves from catastrophic loss. Investing in a cyber insurance policy could save your business should you be the next victim. I know, buying insurance sucks. But you and I also…
Read more

Strategy Day 8 Don’t Neglect Compliance

Maintaining regulatory compliance is mandatory for many organizations. While navigating and satisfying the obligations can be complicated and stressful, achieving compliance is a critical component of having a cyber ready business. Security and privacy are integral elements of compliance. The current situation requires that many businesses to employ work from home availability to key employees.…
Read more

Strategy Day 9 Combat the Password Crisis

With over 80% of hacking-related breaches linked to weak, reused or stolen passwords*1, user credentials are emerging as the top vulnerability for businesses. Balance convenience and security by monitoring the dark web for exposed credentials, implementing multi-factor authentication, and streamlining control of password management. While many think passwords are outdated the fact remains that most…
Read more

End-of-Life for Windows Products

Windows 7 and Server 2008 End-of-Life as passed. Many  people missed it amid the pandemic crisis that we are now trying to overcome. But now that we are in the most trying times and adjusting to remote workforce issues and the like it is even more important for small businesses to look at their current…
Read more

Strategy Day 7 Continuous Network Intelligence

Knowledge is power. A critical component of cyber readiness is having on-demand insight of anomalous activities, suspicious changes, potentially harmful misconfigurations or any other malicious activities occurring internally on your network. Promptly detect and remove threats before they cause damage. I guess this is what I really like. finding bad stuff and removing or fixing…
Read more

Security Awareness Training

Strategy Day 6 Security Awareness Training

Security Awareness Training Users are the weakest link in security, given a lack of education and experience. Instituting a security awareness training program for every member of your staff will significantly reduce the probability of user-related errors and exposures. Those first two lines deserve rereading. That’s right, your employees are the biggest threat to your…
Read more

Strategy Day 5 Back Up Everything!

Data is the lifeblood of every business. Unfortunately, the risks and threats to the protection, privacy and usability of that data are endless. Follow the 3-2-1 method for backups; a minimum of three unique copies of your data, two available locally and one off-site or in the cloud. Make sure to test your backups often…
Read more