fbpx
Boyce, VA 22620
540.850.4226
contact@db-c2.com

Tag: Cyber readiness plan

My Cat is a Hacker.

Yep, you read it right. My cat is a hacker. Well kinda. He is more like of a social engineering con man, which in the tech world would be also known as Human Hacking. I will tell you the story in a minute but first lets discover what social engineering is. Basically it is using…
Read more

Strategy

The Biggest Security Threat to Small Business and How to Fix It

What is the biggest security threat to small businesses today. I will let you know right now that most business owners believe it is getting hacked. In a sense that is true. But often the idea of being hacked is misrepresented in our minds as some guy in a hoodie behind a laptop writing code…
Read more

What is Shadow Tech and Why it matters to your business.

What is Shadow Tech and Why it matters to your business. Shadow Tech is fancy scary word for unauthorized devices being attached and used on your systems. It comes in many forms. Everything from thumb drives, ipods and phones plugged into a users computer to people bringing in their own WiFi routers and plugging them…
Read more

Back to School – 6 Tips to Stay Safe

As you are likely well aware, school is about to begin if it already hasn’t. I am sure you also know that this year will look different from years past. There will be a few things that will remain the same. Back to school sales at brick and mortar retailers for supplies and new clothes.…
Read more

Day 12 Deploy a Multi-Layer Security Strategy

Security is asymmetrical. Where businesses must plan, prepare and defend against every threat or scenario, cybercriminals only need to find a single weakness or hole in your defenses to carry out their malicious plans. Protect your data and your business by deploying multiple security strategies together as one. At DB Cybersecurity Consulting, this is our…
Read more

Strategy Day 11 Reduce Supply Chain Vulnerabilities

Nearly two-thirds of firms (65%) have experienced cyber-related issues in their supply chain in the past year1. As a part of your cyber readiness plan, you must deploy protocols to evaluate and monitor the security of your supplier networks and third-party vendors. This is a really overlooked aspect of your cybersecurity plan. Mostly because it…
Read more

Strategy Day 10 Don’t Skip the Insurance

Increasing risks and threats of data breaches and ransomware, regardless of size or industry, have prompted many businesses to adopt Cyber Risk Insurance to protect themselves from catastrophic loss. Investing in a cyber insurance policy could save your business should you be the next victim. I know, buying insurance sucks. But you and I also…
Read more

Strategy Day 8 Don’t Neglect Compliance

Maintaining regulatory compliance is mandatory for many organizations. While navigating and satisfying the obligations can be complicated and stressful, achieving compliance is a critical component of having a cyber ready business. Security and privacy are integral elements of compliance. The current situation requires that many businesses to employ work from home availability to key employees.…
Read more

Strategy Day 9 Combat the Password Crisis

With over 80% of hacking-related breaches linked to weak, reused or stolen passwords*1, user credentials are emerging as the top vulnerability for businesses. Balance convenience and security by monitoring the dark web for exposed credentials, implementing multi-factor authentication, and streamlining control of password management. While many think passwords are outdated the fact remains that most…
Read more

Strategy Day 7 Continuous Network Intelligence

Knowledge is power. A critical component of cyber readiness is having on-demand insight of anomalous activities, suspicious changes, potentially harmful misconfigurations or any other malicious activities occurring internally on your network. Promptly detect and remove threats before they cause damage. I guess this is what I really like. finding bad stuff and removing or fixing…
Read more