CONTACTUS

Category Archives: IT

Telemundo 39 calls DKBinnovative for Phishing Attack Advice

Telemundo 39 calls DKBinnovative for Phishing Attack Advice

By Javier Cuevas It doesn’t matter who you are, what you do, or where you work, everyone is vulnerable to phishing attacks. That’s what occurred in a recent phishing attack that confronted Telemundo 39 producer and host, Adriana Lopez. Telemundo 39 immediately contacted DBKinnovative for help. The Problem DBKinnovative was contacted by one of Telemundo […]

read more »
Three Steps to Accelerate IT and Cybersecurity Excellence in 2019

Three Steps to Accelerate IT and Cybersecurity Excellence in 2019

by Keith Barthold I’ve got good news: as someone who works on IT efficiency, productivity, and cybersecurity issues of just about every size and variety, I can tell you that many IT needs can be accomplished relatively seamlessly and with minimal investment. Unfortunately, the type and degree of issues that face companies today are only […]

read more »
10 Cyber Facts That Should Put You on Cyber Alert

10 Cyber Facts That Should Put You on Cyber Alert

10 Cyber Facts That Should Put You on Cyber Alert by Keith Barthold Cybercriminals aren’t just targeting big business anymore; cybercrime has become the number one threat for small- and medium-sized businesses (SMBs) as well. And the fact that ransomware attacks are becoming more frequent, sophisticated, and costly should cause wise businesses owners to think […]

read more »
DKBinnovative Ranked Among Top Global Managed Service Providers

DKBinnovative Ranked Among Top Global Managed Service Providers

DKBinnovative Ranked Among Top Global Managed Service Providers DKBinnovative once again ranks among the world’s 501 most strategic, innovative, and forward-thinking managed service providers (MSPs), according to Channel Futures 11th annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest, and most comprehensive ranking of managed service providers worldwide. This year Channel […]

read more »
Enlightening Solutions for the Dark Web

Enlightening Solutions for the Dark Web

Enlightening Solutions for the Dark Web by Keith Barthold Here’s the bad news: ▪  80% of hacking-related breaches leverage either stolen passwords and/or weak, guessable passwords. ▪  85% of businesses with less than 1000 employees have been hacked, and most don’t even know it. ▪  97% of breaches could have been prevented with available technology. Here’s the current state of […]

read more »
HIPAA Wall – A Structure of Safety, Security, and Confidence

HIPAA Wall – A Structure of Safety, Security, and Confidence

In the sometimes-complicated and ever-changing world of healthcare compliance, there are two (at least) rather challenging and undeniable facts: One is that you don’t have a choice as to whether to be HIPAA compliant or not – it’s the law. If you don’t adhere to the provisions of HIPAA – the Health Insurance Portability and […]

read more »
Demystifying “Spectre” and Putting A Freeze on “Meltdown”

Demystifying “Spectre” and Putting A Freeze on “Meltdown”

DEMYSTIFYING “SPECTRE” AND PUTTING A FREEZE ON “MELTDOWN”  By Keith Barthold While many security threats don’t affect the average worker’s day-to-day experience – you may have not even been aware of a lot of them – the latest two menaces that look to wreak havoc on your computing systems are chip vulnerabilities which are surprisingly […]

read more »
The Power of Vendor Management

The Power of Vendor Management

What in the world is vendor management? In short, it’s a way of understanding and maximizing your vendor relationships and agreements. And who needs it? Your business does. Vendor management services are essential because great IT is a team sport, often consisting of a complex mashup of different vendors— an internet service provider, a copy […]

read more »
What is HIPAA Compliance?

What is HIPAA Compliance?

As a health care entity, you know one of your biggest priorities is keeping your patient data safe. That’s really what HIPAA/HITECH is designed to do. It’s a set of standards and compliance that you’ve got to follow to protect patient information. It’s also the law, so it’s important that you know what the law […]

read more »
Recognizing the Value of Continual Gap Analysis

Recognizing the Value of Continual Gap Analysis

To really understand what’s going on in a client environment, you have to conduct a gap analysis and it’s got to be a deep gap analysis — one that’s very granular. When we run one, we take into consideration a growing list of about 350 best practices that touch thousands of data points. In order […]

read more »