CONTACTUS

Category Archives: All

Grade Your Cybersecurity Vulnerabilities Using Our Downloadable Scorecard

Grade Your Cybersecurity Vulnerabilities Using Our Downloadable Scorecard

To mitigate your cybersecurity risk, you have to know where your vulnerabilities lie. Download the DKBinnovative Cybersecurity Scorecard to grade your business in seven critical areas: Employee training and policies Network security Email security Data security Website security User security Endpoint security To find your score, simply place a check next to the questions you can answer [...]read more »
5G Is Coming: A Game Changer For You (And For Cybercriminals)

5G Is Coming: A Game Changer For You (And For Cybercriminals)

5G will be a game changer. It will increase the speed of data delivery across the globe and allow more people to get data faster than ever before. Yet with every new technology adoption, there always seems to be unintended consequences and bad actors. Continue reading to understand the 5G revolution and how you can protect yourself. [...]read more »
Guide to Cyber Insurance Policies

Guide to Cyber Insurance Policies

Cyber attacks are on the rise. Hackers strike on average every 39 seconds. Yet according to IBM, the average time to identify a breach in 2019 was 206 days! How much damage could be done during that time? Seventy-one percent of those breaches were financially motivated, while 25% were espionage. The average cost of a [...]read more »
WEBINAR: Back to Work

WEBINAR: Back to Work

Is your organization gearing up to bring your remote workforce back into the office?  Before moving forward, you may want to take a step back and make sure you have policies and procedures in place to make the transition as smooth as possible. Some important questions to ask: Do employees feel safe coming back into [...]read more »
FORBES: Five Surefire Ways To Get Your Passwords Hijacked

FORBES: Five Surefire Ways To Get Your Passwords Hijacked

As the president and CEO of an information technology services company, I've seen firsthand the importance of protecting yourself and your business from hackers. One of the first steps you can take to ensure you're protected is to create strong passwords. But instead of offering common how-to suggestions, I’m going to throw out a few [...]read more »
Forbes: Seven IT Security Tips For A Remote Workforce

Forbes: Seven IT Security Tips For A Remote Workforce

For many businesses around the world, remote work has become essential to help stop the spread of the coronavirus. Whether you're familiar with working from home or your company is still adjusting, it's important that your information technology procedures don't slip through the cracks. Without a remote worker policy and the proper tools deployed to [...]read more »
Telemundo Dallas: Home Technology Recommendations

Telemundo Dallas: Home Technology Recommendations

Javier Cuevas, vCTO at DKBinnovative, spoke to Telemundo Dallas about the network, computer, and Internet technology your employees need to work from home. Reliable, high-speed Internet connection required Cable or Fiber Internet service of at least 10 Mbps; Increased bandwidth if multiple streaming devices and services exist. Satellite or wireless peer-to-peer Internet service is highly [...]read more »
WEBINAR: Activating and Optimizing Your Remote Workforce

WEBINAR: Activating and Optimizing Your Remote Workforce

> Panelists from 10 of the nation's leading IT management firms > Moderated by DKBinnovative's CEO Keith Barthold The Covid-19 crisis and resulting shelter-in-place orders have many businesses with a remote workforce for the first time, and leaders faced with how to manage telecommuting employees. Learn how to manage your remote workforce productively and securely [...]read more »
DOWNLOADABLE TEMPLATE: Employee Work From Home Policy

DOWNLOADABLE TEMPLATE: Employee Work From Home Policy

There are many advantages to working from home — employees don't have the dreaded daily commute and employers may save on some overhead expenses. But a remote workforce brings its own challenges. How can you maintain the same productivity? What cybersecurity vulnerabilities are introduced when employees use their own wifi and join the business network [...]read more »