Security Blog & Other Important News
Three Steps to Accelerate IT and Cybersecurity Excellence in 2019
by Keith Barthold I’ve got good news: as someone who works on IT efficiency, productivity, and cybersecurity issues of just about every size and variety, I can tell you that many IT needs can be accomplished relatively seamlessly and with minimal investment. Unfortunately, the type and degree of issues that
DKBinnovative Shines a Light on Slavery
DKBinnovative participated in the 2019 Shine a Light on Slavery Day on February 7. The annual event was sponsored by the END IT movement, a coalition of organizations dedicated to ending modern-day slavery. This is the seventh year for the nation-wide event. Born out of the belief that “even one person trapped
10 Cyber Facts That Should Put You on Cyber Alert
10 Cyber Facts That Should Put You on Cyber Alert by Keith Barthold Cybercriminals aren’t just targeting big business anymore; cybercrime has become the number one threat for small- and medium-sized businesses (SMBs) as well. And the fact that ransomware attacks are becoming more frequent, sophisticated, and costly should cause
DKBinnovative Ranked Among Top Global Managed Service Providers
DKBinnovative Ranked Among Top Global Managed Service Providers DKBinnovative once again ranks among the world’s 501 most strategic, innovative, and forward-thinking managed service providers (MSPs), according to Channel Futures 11th annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest, and most comprehensive ranking of managed service
Enlightening Solutions for the Dark Web
Enlightening Solutions for the Dark Web by Keith Barthold Here’s the bad news: ▪ 80% of hacking-related breaches leverage either stolen passwords and/or weak, guessable passwords. ▪ 85% of businesses with less than 1000 employees have been hacked, and most don’t even know it. ▪ 97% of breaches could have been prevented with available technology.
HIPAA Wall – A Structure of Safety, Security, and Confidence
In the sometimes-complicated and ever-changing world of healthcare compliance, there are two (at least) rather challenging and undeniable facts: One is that you don’t have a choice as to whether to be HIPAA compliant or not – it’s the law. If you don’t adhere to the provisions of HIPAA –
Demystifying “Spectre” and Putting A Freeze on “Meltdown”
DEMYSTIFYING “SPECTRE” AND PUTTING A FREEZE ON “MELTDOWN” By Keith Barthold While many security threats don’t affect the average worker’s day-to-day experience – you may have not even been aware of a lot of them – the latest two menaces that look to wreak havoc on your computing systems are
The Power of Vendor Management
What in the world is vendor management? In short, it’s a way of understanding and maximizing your vendor relationships and agreements. And who needs it? Your business does. Vendor management services are essential because great IT is a team sport, often consisting of a complex mashup of different vendors— an
What is HIPAA Compliance?
As a health care entity, you know one of your biggest priorities is keeping your patient data safe. That’s really what HIPAA/HITECH is designed to do. It’s a set of standards and compliance that you’ve got to follow to protect patient information. It’s also the law, so it’s important that
Recognizing the Value of Continual Gap Analysis
To really understand what’s going on in a client environment, you have to conduct a gap analysis and it’s got to be a deep gap analysis — one that’s very granular. When we run one, we take into consideration a growing list of about 350 best practices that touch thousands
The IT Department Dilemma: Outsource or In-House?
As a business leader you’ve got a choice to make: Do you hire IT internally or do you move forward with a strategic partner like DKBInnovative? The difference is that you could build out a team like we have which is made up of various experts of different specialties: from
Are Your Devices Always Listening? — 600 KOGO News Radio Interview with DKB Innovative President and CEO, Keith Barthold
KOGO: Voice technology can be both amazing and frustrating. You can ask your phone a question; sometimes they’ll understand what the question is. You can talk to your speaker system. Even book an Uber. With the right setup, you can lock the doors in your house, dim the lights, do
What is a Virtual CIO?
What our virtual CIOs do is understand our clients’ businesses. They understand what the drivers and goals of an organization are, and how technology can accelerate the achievement of those goals. Virtual CIOs work closely with the rest of their team to take misalignments and technology, and combine them with
The Hidden Cost of Poor IT
Anyone who has bought a car, a home, or the latest iPhone knows that there’s a lot more to the price of an item than the price of an item. Maintenance, complementary products, and repairs are every bit as much a necessary and significant expenditure as the original price tag.
What’s the Difference Between a CIO and a CTO?
The difference between a chief information officer (CIO) and a chief technology officer (CTO) is really a difference in perspective. A CIO is focused on the company’s business and what their goals and objectives are, and how he can come up with solutions to create business results. The mind of
Passwords and the Bright Side of the Dark Web
The dark web is a real thing. It’s a special internet that requires a separate web browser to access. Once on the web browser, those users are completely anonymous. With this anonymous store front – basically for illegal activity – it also creates an environment where identity theft is rampant
Tech Tips For Disaster Prep—It Could Happen To You
In the aftermath of Hurricane Harvey, and remembering our own local devastation after tornadoes and other punishing storms, below are some practical technology tips to keep in mind when the forecast turns dangerous. Contact your IT team to verify what is being backed up. Ask them to run a test
More About The Texting Scam Called SMiShing
SMiShing is a cell phone scam where thieves can steal your identity by stealing your cell phone number. Our cell phones are such an integral part of each day now, and I really hate it that the bad guys are targeting us through such an intimate daily resource. You see
SMiShing: A Dangerous New Cell Phone Scam
Our cell phones have long been an intimate, helpful, often fun element in our daily lives. When our cell phone rings, historically we have known it was okay to answer. But in the last year or so, this relatively ‘safe’ device in our lives has changed—and it’s not for the
Our Texas: We Step Up
A Catastrophe—But Not Bigger Than Hearts In Texas As the rain begins to recede and rescue efforts continue, our prayers go out to Hurricane Harvey victims. Several of our DKB team members, clients, and friends are either there or going this week to take supplies and help with distribution. I’m so
NBC5 Talks To DKBinnovative About Identity Theft Through Cell Phones
Just when we think we understand the latest virus or malware, something else comes along. It’s a personal nightmare for me to think of having my identity stolen. There will be so many hours spent notifying financial institutions, freezing accounts, alerting friends, vendors, and business associates, etc. I was pleased
DKBInnovative Named To Inc.5000 2017 List Of Fastest Growing Companies
Here at DKBInnovative, we just learned that we are on the Inc.5000 2017 List of Fastest Growing Companies–and we are thrilled. In each of our thirteen years of business, we have given our maximum effort to the company mission. We committed to earning the trust of our clients by providing
DKBInnovative Talks to NBC5 About Laptop Safety
NBC5, the Dallas/Fort Worth affiliate, called DKBInnovative last week for IT expertise when they were researching a story about exploding laptops. Kudos to the producers of that story for being so thorough before presenting their piece, and thanks to our own Randy Haba for passing along a valuable tip to
Move From Fearful To Reassured
Which type of business leader are you? One kind reads headlines about ransomware attacks and doesn’t know if he needs to take action and, if so, where to start to ensure that he is protected. The other kind knows the status of her systems, the protections in place, and whether
Information Technology Seeking Long-Term Relationship With Your Practice
Any medical team in any practice will tell you that every day is a roller coaster of events and emotions, and only part of that comes from the patients. After the last appointment of the day, there is always follow up to do, no matter how efficient each practitioner and
DKBinnovative is on the move!
Exciting things are happening at DKBinnovative, and we have important news to share! As part of our commitment to deliver World Class Service to our customers, we have made significant investments in our people and infrastructure over the past few years. We are proud to announce that, due to our
DKBinnovative Accends List of 2017 World’s Top 501 Managed Services Providers (MSPs)
Exciting news to share! MSPmentor 501 has named DKBinnovative in its List of World’s Top 501 Managed Service Providers for 2017. The MSPmentor 501 ranking is the IT channel’s largest and most comprehensive list of leading Managed Service Provider (MSP) organizations worldwide. The 2017 MSP 501 list and survey
How hackers can steal your identity when using public WiFi
The Internet is an increasingly hostile environment. DKBInnovative’s extensive background both as an integrator and consumer of wireless technology makes it possible to offer expert consulting support for a broad range of wireless applications. Our expert “ethical” hacker Randy Haba recently partnered with NBC 5 Responds to show just how easy
An Open Letter to Our Clients
Dear DKB Clients: Remember getting ransomware this weekend? Of course you don’t because it never happened! DKBinnovative has your back. This past Friday, malware known as WannaCry spread over 100 countries wreaking havoc for thousands of networks, namely shutting down much of the UK’s healthcare system. It was declared the
SOCIAL MEDIA AND HIPAA COMPLIANCE
Let’s face it, social media is part of every business today. Healthcare providers using social media face thousands of dollars in HIPAA penalties and fees if there is a breach of protected information. Do you have a clear policy and procedure for your team? Here are basic best practices to
Hesitant to Use Apple Pay? It May Soon Be the New Debit Card | NBC 5 Dallas-Fort Worth
Apple Pay is simple to use and works with the devices you use every day. Easily pay with your debit cards and credit cards with just a touch. And because your card details are never shared by Apple when you use Apple Pay, making payments with your iPhone, Apple Watch, iPad, and Mac
Spying On Cell Phones
High-tech surveillance tools that fit in a briefcase and mimic real cell phone towers to fool nearby mobile phones is one of the resources law enforcement, military and yes – hackers use. These devices called “Stingrays” do everything from pick up calls and texts to jamming cell service or identifying
Selecting Your Next Healthcare IT Partner
In 2016, the top five reasons for outsourcing IT were enhanced security, proactive approach to technology, maximizing operations, access to newer technologies and cost savings. As a healthcare provider, finding a technology service provider with Healthcare experience is also vital for you. Per Omnibus federal law, your technology provider
Why You Need Identity Management and Governance
This New Year we have been inundated with warnings from experts and journalists that 2017 will bring an increase of DDoS, IoT and Ransomware attacks that will far exceed 2016’s record. A New York Times report last year noted 83 million JP Morgan Chase customers had their credentials stolen when hackers were able
How hackers can steal your identity when using public WiFi
The Internet is an increasingly hostile environment. DKBInnovative’s extensive background both as an integrator and consumer of wireless technology makes it possible to offer expert consulting support for a broad range of wireless applications. Our expert “ethical” hacker Randy Haba recently partnered with NBC 5 Responds to show just how easy
Life happens. Do you have a Disaster Recovery Plan?
Please offer your prayers for Officer Keith D. Bartlett, Lorretta Bartlett, and their five children. Their home in Era, TX caught fire the evening of 12/12/16 and was completely lost. Contents–including Christmas gifts, clothes, appliances, furniture, and sadly their dog Chico—are gone. Have you set up a Disaster Recovery Plan for your business? Life happens. This
RANSOMWARE: Are You Protected? (as published in Dallas Medical Journal, Nov. 2016)
You’ve been thinking that your private practice won’t get hacked? Or that your small, rural hospital is totally under the global cyber crimes radar? That there’s not enough monetary value in your database to interest cyber thieves? You’re just wrong. Private Health Information (PHI) is coveted for identify theft and
DKBInnovative Is One Of The 20 Most Promising IT Productivity Solutions Providers 2016 Named By CIOReview
The prestigious IT industry print magazine, CIOReview, recently listed DKBInnovative, a Dallas-based IT managed services company, in their top 20 Productivity Solutions Providers of 2016. Companies in the list have exhibited in-depth expertise in engineering best-in-class productivity tools. Dallas, TX (PRWeb), November 1, 2016—DKBInnovative, a Dallas-based IT managed services company,
Dallas ISD Taps DKBInnovative, Local IT Management and Support Company, For Technology Trends Update
Dallas-based IT management and support company DKBInnovative was asked to present an update on technology trends and threats in a professional development seminar sponsored by the National Academy Foundation, specifically for members of the NAF Information Technology departments in the Dallas Independent School District. Dallas, TX (PRWeb) October 18, 2016—DKBInnovative
How to really stink at security — the 10 DON’Ts of IT security
Maintaining a secure IT network is paramount for any business — especially in a day and age of sophisticated viruses, rogueware, spyware and the many other threats that can compromise the heart of your company. Unfortunately, many businesses and their employees are simply too busy and tied up with their
Ransomware – How to prevent being a hostage to your system
As time passes and technology evolves, viruses and rogueware continue to advance and become more sophisticated. “Scareware” and “ransomware” are two terms that are coming up more and more in offices across the United States. These are two forms of rogueware that have actually turned into an industry worth over
Disaster recovery — Protection against data loss
Picture, for a moment, that your business is hit by a catastrophic incident. Maybe a fire has destroyed your office or your company’s network has been attacked full force by hackers, thus, decimating your system. How would your business respond? Would it scramble to find the necessary help and resources
From Me To You: Train Your Employees To Help You Fight Cyber Crime
At some point in your business growth and development you realized that you could no longer work alone and you started hiring. No matter the size of your staff now, because of technology advancements and the influx of now-necessary web-connected devices, those helpful employees could also be the next open
From Me To You: If Your Business Depends On The Internet, Know This
How costly is it these days to have your internet go down? How impatient are we all when we see “No Service” showing on our smartphones? In today’s business, our consistent connection to the world has become a necessity—and it didn’t take the bad guys long to figure out how
From Me To You About Ransomware: It’s Serious
Ransomware can happen to you. In the time it takes to open an attachment, all your company data can be seized, and then you have a choice to make. Do you pay the money to get your data back and if so, has it been copied and/or compromised? How much