DP Solutions Logo WHITE-01

 

WELCOME TO OUR BLOG

Common Attack Types on APIs

The number of Application Programming Interfaces (APIs) deployed within organizations is multiplying. According to this survey, 26% of businesses use at least twice as many APIs as they did a year ago, increasing the attacks on APIs. APIs are integral to any application, making them a prime target for attacks. The Open Web Application Security Project (OWASP) has published the Top 10 API security attacks associated with API vulnerabilities which this blog will discuss..

View More »

Quarterly Business Reviews: Planning for Success

Quarterly business reviews (QBRs) are a valuable service provided by most leading IT service providers to help your organization optimize technology and plan for future IT needs. Read on for an introduction into this powerful tool.

View More »

What Backup and Disaster Recovery Resources Do You Really Need?

Not sure what backup & disaster recovery resources are necessary to keep your organization protected? This blog outlines 3 ways to determine the tools and services best suited to your business. 

View More »

How to Get the Most out of Microsoft 365

Want to make sure you're getting the most out of your Microsoft 365 subscription? Here are a few tips and tricks to improve your experience with Microsoft 365 including SharePoint, Teams and OneDrive.

View More »

CyberSecurity Best Practices

There is no better time to make sure you and your staff are prepared to deal with cybersecurity threats.  Here are 7 security best practices to make sure your organization has the basics of cyber-hygiene covered:

View More »

Creating Your Disaster Recovery Action Plan | Tripwire

*As featured on Tripwire.com - March 1, 2022

Perhaps Disaster Recovery (DR) isn’t one of the hot terms like the Internet of Things (IoT) or Hybrid Cloud, but I would argue that re-examining your DR plan now might be one of the most important IT management initiatives on which you can focus your energy.
 
Think about it. How much has the world changed in the past two years? Most people used to think about disasters as typical IT incidents such as system failure, ransomware incidents, or power outages. While these are still critical disasters to plan around, the pandemic brought a shift to increased decentralization of technology and people, changing the way we work, the security landscape, and how we define and respond to a disaster. Now our disaster recovery plans need to be broader and more comprehensive than ever before. 
View More »

APIs: What they are, the benefits & why security is a worry (Guest Blog)

What in the world is an API?

If you use a travel app (e.g., Expedia) to find what different airlines are flying to your destination, or if you’ve seen Google Maps embedded on a site, then you’ve interacted with an API.

An Application Programming Interface (API) is a set of operations that allows applications to access data and interact with external software components.

An API delivers the user’s action to a system, then sends the system’s reply to that user. When someone clicks “Add to Cart,” the API tells the site that a product was added, the site puts the product in the cart, and the cart gets updated.

We use APIs all the time but most of us never think about them at all. They greatly expand the services that a site or app can render. This service expansion is made possible by developers of both the APIs and the sites that use them. Many site developers don’t need to create APIs – they just need to use the APIs that are made available by whatever product or service is being used.

View More »

5 Popular Cyber-Attacks, How to Spot Them & What You Can Do

Learn the surefire signs of the five most common types of cyber-attacks and how you can fight back to protect yourself and your business.

View More »

Understanding the Different Types of Data Backups

In this blog, we'll review some general types of data backups so that as you continue to change the way you work with data, you can be comfortable that your data is protected from loss. We’ll also discuss some other considerations about each of these types of backups.

View More »

How to Build Your Human Firewall for Rock Solid Cybersecurity

The concept of the “Human Firewall” is essentially the people aspect of cybersecurity. While spam filters can block many of the threatening emails you receive, and strong endpoint detection solutions can help stop malware attacks in progress, at the end of the day your security’s greatest strength or biggest vulnerability is the people behind it.

View More »

SUBSCRIBE