CONTACTUS

Desktop & Data Security

Stop Security Breaches that Start with End Users

One click. One wrong link. Most security breaches are initiated by the end user and it takes only a moment to compromise critical data and system security. Gone are the days when an antivirus solution and firewall provided all the protection needed. Do you have the right tools to mitigate persistent threats and protect sensitive data? How do you even know–in today’s lightning evolution of technology? DKBinnovative stays right on top of all this. Your system security is the highest priority.

Are You Prepared? Preparing with a Layered Approach to Security


Data loss protection

Content filtering

Antivirus/anti-malware

File sync and share

Multifactor Authentication

Disk Encryption

Least privilege security rights

End user training and awareness

Network monitoring

Patching

Device optimization tools

Cloud endpoint backup

Firewall and penetration testing

Tips & Tricks

General Protection Tips to protect and thwart crypto ransomware threats and attacks
Make sure that endpoint security is installed and set up correctly. It is worth checking that the appropriate protection policies are active and applied to the correct user groups or however policies are allocated.
Check regularly that backups are working. It’s vital to check that backups are working and that data integrity is maintained and data is easily restored to the host.
Keep all plugins up to date. Keeping all third party plug-ins updated to their latest build is an important counter to exploits. Make this part of your patch management regime.
Ensure the latest Windows updates are applied. A number of infections are instantly ruled out if Windows is up to date. Reduce workload by putting in place a patching routine. This is a security fundamental.
Disable Windows Scripting Host. VBS are Microsoft scripts used by malware authors to either cause disruption in an environment or to run a process that will download more advanced malware. Disable them completely by disabling the Windows Scripting Host engine that VBS files use to run.
Disable autorun. Autorun is a useful feature, but it is used by malware to propagate itself around a corporate environment. With the growth of USB sticks, malware increasingly uses autorun as a means of proliferation. Commonly used by Visual Basic Script (VBS) malware and worms, it is best to disable it as a Policy.
Use a modern browser with an ad blocking plugin. Modern browsers like Chrome and Firefox are constantly being updated to remove vulnerabilities. They also give the option to add plug-ins that will make users more secure. At the most basic level, simply having a pop-up blocker installed and running can save a lot of users from getting infected.
Have users run as limited users and not admins. This is highly desirable from a security perspective but not always possible for power users. This tip is important because some current ransomware threats are capable of browsing and encrypting data on any mapped drives that the end user has access to. Restricting the user permissions for the share or the underlying file system of a mapped drive will provide limits to what the threat has the ability to encrypt.
Show hidden file extensions. One way ransomware like CryptoLocker and others frequently arrive is in a file named with the extension “.PDF.EXE” or something similar. The malware writer counts on the default Windows behavior of hiding known file extensions. If full file extensions are visible, it is easier to spot suspicious files.

Our Certifications

Microsoft Data_Admin2
A Plus
APLUS2
FUJITSU
HIPAA2
HP2
ITIL2
Lenovo
Lenovo 2
Microsoft Partner
Microsoft Professional
Microsoft Trainer
Network Certified
Novell Directory Engineer2
Novell Engineer2
PMP2
Sonicwall2
Thinkpad
Read/Watch Our
Whitepaper Press Release Case Study Webcast
Latest