Skip to main content

Technology Insights Blog

Travel Smart: Essential Cybersecurity Practices For A Hack-Free Vacation
Summer is a popular time for business owners and employees to step out of the office and take a well-deserved vacation. Even if their “out of office” e-mail responder is active, many people will perio...
Lessons Learned from a $1.6 Billion Ransomware Attack
In recent months, the alarming cybersecurity breach at Change Healthcare, the health care payment-processing company under the health care giant UnitedHealth Group, has thrown a spotlight on a chillin...
Incident Response: Strengthening Your Business Resilience
Would you know what to do if your organization were suddenly hit by a cyber-attack or security breach? Unfortunately, this is a very real scenario that today’s businesses must be ready to face. The po...
The Power of Multi-Factor Authentication
In today's hyper-connected digital landscape, where cyber threats are becoming more sophisticated by the day, safeguarding sensitive information has never been more crucial. As businesses and individu...
5 Ways AI is Transforming Businesses in 2024
For small and midsized businesses (SMBs), staying ahead means embracing cutting-edge technologies. Top of the mind for many organizations is artificial intelligence (AI), which is proving to be a game...
Navigating the Top 6 Tech Hurdles for Small Business Owners
Technology can provide a strategic advantage for companies in every industry when properly utilized. However, one of the biggest issues small business owners face is overcoming some of the common tech...
Microsoft Copilot: Empowering Maryland CEOs, Owners & CFOs
In the dynamic landscape of modern business, efficiency is the cornerstone of success. Every decision-maker, from CEOs to CFOs, understands the pivotal role technology plays in driving productivity an...
Navigating the Cybersecurity Maturity Model Certification (CMMC) Landscape
In today's digital age, cybersecurity is paramount, especially for organizations identified as a government contractor. With an ever-evolving threat landscape, the DoD introduced the Cybersecurity Mat...
9 Essential Cybersecurity Practices Every Organization Must Implement
Cybersecurity should be a top priority for organizations of all sizes. With the increasing frequency and sophistication of cyber threats, it's essential to have robust defenses in place to protect sen...
Beware of Smishing: The Sneaky Cyber Threat You Need to Know About
In our increasingly digitized world, where smartphones have become extensions of our hands and online transactions are part of our daily routine, cyber threats continue to evolve. One such threat that...
5 New Cybersecurity Threats You Need To Be Very Prepared For This Year
The year of 2023 marked a significant turning point for cyber-attacks with the introduction and wide proliferation of AI (artificial intelligence), now in the hands of people who wish to do you harm a...
Why You Need Cyber Insurance
Cyber risk is everywhere. From credential theft to misconfigurations to vulnerabilities and even phishing attempts, there are cyber criminals poking and prodding at organizations from every angle. Thi...
6 Reasons Why It’s Absolutely Essential to Keep Your Tech Updated
If you are still running on old technology, such as Windows Server 2008 or 2012, your business is at risk. In the fast-paced world of technology, staying up to date is not just a matter of convenience...
The Intersection of Data Loss Prevention and Scam Detection: A Comprehensive Guide
Today's businesses frequently face a barrage of security risks, ranging from harmful malware to unauthorized access attempts and social engineering schemes. While many companies might overlook the fre...
Scammers Are Using Popular Brands To Trick You Into Revealing Your Private Data
Cybercriminals know that one of the easiest ways to sneak under the radar is to pretend to be a brand people know and trust. These are companies that have spent years on marketing, customer service, b...
Are Your Business Tools Ticking Time Bombs For A Cyber Attack?
In June of 2023, a popular file-sharing software amongst big-name companies, like Shell, Siemens Energy, Sony, several large law firms, and a number of US federal agencies, was hacked by the Russian-l...
Safeguarding Your Cloud Castle and Ensuring Strong Cloud Security
In recent years, more and more organizations have been making the shift, either fully or partially, to cloud-based solutions of all kinds—data storage, computing, and infrastructure, just to name a fe...
Virtual Learning and Security Compliance
Virtual learning, a key component of most cybersecurity awareness training programs, uses web-based platforms to allow employees to complete their training anytime, anywhere in the world. Many regulat...
Windows Server 2008/2012 End of Support - Know Your Options
Windows Server 2012 and Windows Server 2012 R2 will end on October 10, 2023. This means that after this date, these products will no longer receive security updates, non-security updates, bug fixes, t...
Internal Threat Management: Is Your Data Safe?
Protecting an organization and its data from a breach or attack can be a daunting task to undertake. There is such a wide range of possible dangers that preventing risks from evolving into active thre...
Protect your organization from email Security threats
What do these three real e-mails have in common? 1. Kohl’s Winner – “Notifications – Re: 2nd attempt for Paul” 2. WalmartStores – “Re: CONFIRMED: Paul you are selected” 3. Lowe’s Winner – “Congratulat...
Email Security: A Pillar of Cybersecurity You Shouldn't Ignore
Since nearly every business has an email system, and the average worker receives many messages daily, emails can serve as a reliable initial infection vector. The overwhelming number of emails can tri...
Why “Break-Fix” Works In The Consultant’s Favor, Not Yours
A common question we hear from prospective clients is, “Why do I need to be on a managed IT plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate questi...
Compliance And Cyber Security: Why Both Are Important
In the world of business, you’ll inevitably hear about the many ways to beef up your cyber security to ensure your company’s and clients’ safety. However, another term is often heard when discussing c...
Take Your Business To The Next Level With These Technology Solutions
When you set goals for your business, there’s a good chance that one of those goals was tied to growth. It’s a common goal. You have your eyes set on acquiring new customers. You’re ready to take your...
Back To School! 4 Cyber Security Training Musts For ALL Your Employees
It’s back-to-school season! Soon, our kids will return to the classroom, where they will relearn the information from the prior school year to ensure that they were able to retain that knowledge. Ther...
Common Attack Types on APIs
The number of Application Programming Interfaces (APIs) deployed within organizations is multiplying. According to this survey, 26% of businesses use at least twice as many APIs as they did a year ago...
Quarterly Business Reviews: Planning for Success
Quarterly business reviews (QBRs) are a valuable service provided by most leading IT service providers to help your organization optimize technology and plan for future IT needs. Read on for an introd...
What Backup and Disaster Recovery Resources Do You Really Need?
Not sure what backup & disaster recovery resources are necessary to keep your organization protected? This blog outlines 3 ways to determine the tools and services best suited to your business.
How to Get the Most out of Microsoft 365
Want to make sure you're getting the most out of your Microsoft 365 subscription? Here are a few tips and tricks to improve your experience with Microsoft 365 including SharePoint, Teams and OneDrive.
CyberSecurity Best Practices
There is no better time to make sure you and your staff are prepared to deal with cybersecurity threats. Here are 7 security best practices to make sure your organization has the basics of cyber-hygie...
Creating Your Disaster Recovery Action Plan | Tripwire
*As featured on Tripwire.com - March 1, 2022 Perhaps Disaster Recovery (DR) isn’t one of the hot terms like the Internet of Things (IoT) or Hybrid Cloud, but I would argue that re-examining your DR pl...
APIs: What they are, the benefits & why security is a worry (Guest Blog)
What in the world is an API? If you use a travel app (e.g., Expedia) to find what different airlines are flying to your destination, or if you’ve seen Google Maps embedded on a site, then you’ve inter...
5 Popular Cyber-Attacks, How to Spot Them & What You Can Do
Learn the surefire signs of the five most common types of cyber-attacks and how you can fight back to protect yourself and your business.
Understanding the Different Types of Data Backups
In this blog, we'll review some general types of data backups so that as you continue to change the way you work with data, you can be comfortable that your data is protected from loss. We’ll also dis...
How to Build Your Human Firewall for Rock Solid Cybersecurity
The concept of the “Human Firewall” is essentially the people aspect of cybersecurity. While spam filters can block many of the threatening emails you receive, and strong endpoint detection solutions ...
Spotlight on Cybersecurity Awareness Month – Cyber First!
The last week of Cybersecurity Awareness Month, focuses on putting Cybersecurity First. That means embedding it into your business plan and making it a part of your operation… not an afterthought. Man...
Cybersecurity Awareness Month – Cybersecurity Careers
One of the biggest challenges in the U.S. is the limited amount of talent available to protect our technology systems. However, careers in cybersecurity can be extremely rewarding both personally and ...
Spotlight on Cybersecurity Awareness Month – Phight the Phish!
Phishing is the most common cyber-attack that people will encounter. You and your staff are the deciding factor on whether phishing is just an annoyance, or something that leads to a business crisis. ...
Spotlight on Cybersecurity Awareness Month – Be Cyber Smart!
Being Cyber Smart means having strong security practices & cyber hygiene. In this blog, you'll get 3 tips to be Cyber Smart without breaking the bank on products & services. The National Cyber...
SIEM & SOC - An Overview
What is a SIEM? What is a SOC? And what should I know about them as a decision maker in my business?
How to Be Prepared for Cyber-Liability Insurance
Getting a policy to cover costs related to cybersecurity incidents is increasingly becoming a normal part of business. So what should your organization do to prepare for cyber-liability insurance cove...
What does “Proactive IT Services” really mean?
We hear a lot of companies, especially in the technology space, talk about proactivity. Yes, it’s a buzzword, but there is value to be had in the core concept of proactivity. These days, you don’t wan...
Where does Outsourcing fit for my IT Management?
Technology has broadened as services and products require expertise that can’t be mastered by one person. There is a good chance that even if you have technology specialists on your staff, outsourcing...
Types of Disasters to Consider for Your Disaster Recovery Plan
A Disaster Recovery (DR) Plan is the strategy an organization uses to recover business operations quickly in the event of a disaster. To successfully recover from a disaster, businesses need to identi...
Business Security Essentials (Podcast Interview)
Listen in as DP Solutions' Director of Strategic Operations Ben Schmerler talks cybersecurity basics on Defiant Enterprise's Business Security Podcast, hosted by Tom Freedman & Victoria Yassem. Be...
Why Is Disaster Recovery Essential To Your Organization?
As more and more organizations begin using cloud-based tools, mobile devices, and an anytime/anywhere approach to work, the likelihood of falling victim to an incident that impacts your technology, an...
Predictions for Phishing and Social Engineering in 2021 (Video)
It would be an understatement to say that 2020 was a year of transformation. Many trends that were already well underway were accelerated by the pandemic and the shift to Work From Home. Sadly, cyberc...
Frequently Asked Questions About DP Solutions and Working With an MSP
Choosing a Managed IT Services Provider (MSP) to support your organization’s technology operations is a serious decision. In the managed services model, the service provider partners with a business t...
Technology Trends for 2021 (Video)
2020 is almost over, which is probably a relief for many of you. To say it’s been a unique year is an understatement. But as we try to move forward with optimism for 2021, we have to start thinking ab...
Lessons from the Ransomware Attacks at Baltimore County Public Schools
Just before Thanksgiving this year, as students were entrenched in virtual learning, a major ransomware attack took down Baltimore County Public School’s (BCPS) computer systems. As a result, schools ...
What could 5G change about the way we use technology?
It is fascinating to look back over the last decade or so to see how cellular networks have evolved. As smartphones like the iPhone and Android became the norm as opposed to a luxury consumer technolo...
4 Factors to consider when Choosing a Managed IT Services Provider
Technology success is one of the key drivers for achieving business goals in 2020. As recent events have proven, organizations that were ready to leverage technology to work anytime or anywhere with m...
The 5 Best Ways to Handle Sensitive Data (Tripwire)
*As featured on Tripwire.com - October 21, 2020 There are two significant trends occurring right now that shouldn’t be a surprise to anyone reading this post. First, businesses are gathering and lever...
CMMC 101: KEY ASPECTS OF THIS NEW COMPLIANCE STANDARD
About a year ago, we started hearing about new requirements for organizations doing business with the United States Federal Government, particularly with the Department of Defense (DoD). In the intere...
Back to School in a Socially Distanced World (Video)
We talk a lot about how our work lives have changed, in some ways permanently, by the pandemic. Most of us who typically would spend a lot of time in offices, or visiting clients, or participating in ...
Social Media Threats in 2020 (Video)
Between Facebook, LinkedIn, Twitter, Tik Tok, Instagram, and whatever other Social Media platforms that are on the horizon, our lives are more public than ever before. There are definitely upsides and...
3 Big Trends in 2020 Social Engineering (Video)
Social Engineering sounds like a buzzword, but it is one of the most pervasive and relevant threats facing people today. Most hackers have simple motivations. They want to steal credit card, banking i...
IT Policies That Every Organization Needs
Many businesses, especially smaller ones, have a blind spot when it comes to security and risk management, especially when it comes to internal policies. While there are ample technology solutions ava...
Key Cybersecurity Trends for Professionals to Consider in H2 2020
Coronavirus 2019 (COVID-19) has made it more difficult for organizations to fulfill their chief digital security functions. In a recent study from (ISC)2, nearly half (47%) of security personnel revea...
Why Tech Implementations Fail (Video)
Technology changes are inevitable in almost any business. But sometimes, they don't go as planned. Watch the video below to see why new technology implementations sometimes fail and how you can avoid ...
How to Start a Virtual Law Office
Long before current events made working remotely the norm, law firms began moving more and more towards the Virtual Law Office. In addition to safety concerns, attorneys working remotely benefit from ...
VPNs: What Do They Do, and What Don’t They Do? (Tripwire)
*As featured on Tripwire.com - July 12, 2020 Virtual Private Networks, or VPNs, are not exactly a new technology. When I started my career in IT about 15 years ago, VPN tunnels were the standard way w...
Managed IT Services Explained
What is Managed IT Services? It's a common question that we hear often. This short video clip explains how Managed IT Services from DP Solutions can support your organization!
Phasing Your Staff Back into the Office (Video)
The last couple of months have been unlike anything we’ve experienced in the past. Whether you are a worker on an assembly line, a healthcare employee on the front lines or a back-office staffer, your...
7 Easy-to-Use Remote Tools To Enhance Your Telework Experience
Business has permanently changed. In the early days of COVID-19, many people looked at the pandemic as a temporary setback. Perhaps due to optimism, they looked at this situation as if working from ho...
VIDEO Panel: The Changing Role of the CIO/CTO
While the disruption caused by the COVID-19 crisis is truly unprecedented, what can technology leaders do now to better prepare their businesses for major disruptions in the future? Mindgrub CEO Todd ...
Technology Lessons Learned from the Pandemic (Video)
The current pandemic has forced us to look at incident management planing with a real-life crisis that requires fast change in order to remain successful at what we do. At the time of this recording, ...
Setting Up a Secure Remote Workspace in Your Home
Due to the Coronavirus disruption, many businesses found themselves needing to quickly come up with remote work solutions so their productivity wouldn't plummet. While some organizations had the infra...
4 THINGS YOU DIDN'T KNOW YOU COULD DO WITH MICROSOFT TEAMS (VIDEO)
With so many people working remotely these days, effective communication and collaboration tools are more important than ever. Microsoft Teams is an excellent resource to keep your team connected and ...
How To Quickly Shift To A Work-From-Home Business Model
As a business owner today, you are now facing unprecedented challenges to help deal with the coronavirus pandemic. You are asked to self-isolate and practice social distancing to “flatten the curve.” ...
5 Steps To Rise Above The Fear Of COVID-19 & Focus On Business Growth
In a matter of just a few short weeks, we have gone from living how we’ve always lived to changing just about everything we do. Schools are out for weeks if not months. Cruises have stopped sailing, a...
How to Stop Cyber-criminals During this Global Pandemic
The world is slowing down during this COVID-19 pandemic. Wall Street is being hit hard. People are no longer going out. We’re told to quarantine or self-isolate and not engage in groups. You can bet t...
FAQs: Coronavirus & Your Technology
DP Solutions recently hosted a live Town Hall style webinar to answer our viewers' most pressing questions about adapting their technology amidst the Coronavirus pandemic. Below is a summary of the Q&...
Getting the Most out of Microsoft Teams
In a time where many people are telecommuting to work and more and more “home offices” are popping up, Microsoft Teams is one of the most valuable tools you can use to maintain a cohesive and producti...
Tips for Working Remote (VIDEO)
With the COVID-19 pandemic, many companies are encouraging their staff to work from home in order to limit the spread of the Coronavirus and keep their staff safe.  I don’t think anybody knows what’s ...
How to Protect Yourself Against Coronavirus Cyber Scams
Cyber-criminals are seeing the COVID-19/Coronavirus pandemic as an opportunity to exploit the public’s fears and anxiety. They are now weaponizing these feelings into cyber-attacks. In fact, the US De...
How DP Solutions Helps Businesses to Telework
With many States across the U.S. taking major actions to limit the spread of COVID-19, businesses need to offer their staff with options to telecommute. DP Solutions can help! When you join our Manage...
Coronavirus: 10 Tips to Enable Employees to Work from Home
The outbreak of the Coronavirus (Covid-19) has many employers evaluating their capabilities to allow staff to work from home. Considering this current pandemic, it’s important that your organization i...
The Risks of Over-Sharing on Social Media
Did you know that sharing too much information on Social Media makes it that much easier for cyber-criminals to target you for a Spear Phishing attack? In under 5 minutes, Ben Schmerler shows you 3 wa...
The OFFICIAL end of Windows 7
I wanted to take a moment and comment on some recent news regarding Microsoft Windows and security. Two important events happened on Tuesday, January 14, 2020: Microsoft released a security update for...
Cyber Concerns Surrounding Current Events
As a Managed IT Services Provider, we consider it our responsibility to provide information on factors that could potentially impact organization's technology, and as a result, their businesses. Due t...
Malware in the Cloud: Protecting Based on Cloud Environment
*As featured on Tripwire.com - January 7, 2020 In some ways, the cloud has made security management easier, as many cloud providers have taken the responsibilities traditionally associated with local ...
Revisiting Concepts of Disaster Recovery & Risk Moving to the Cloud
*As featured on Tripwire.com - October 17, 2019 The calculus for disaster recovery and risk management is changing. Most small businesses within the past decade would often keep many of their critical...
Back to School Cyber-Security
*As featured on WJLA ABC7, August 13, 2019 Online and device security may not be the first thing that comes to mind with the new school year, but more and more middle school, high school and college s...
Moving to the Cloud and How to Shift Your Security Management Strategy
*As featured on Tripwire.com - August 4, 2019 As someone who has worked for their entire career in the Managed Network Services space, if I had to pick out, over the past five years, two of the most i...
Shield your devices from hackers with these travel tips
*As featured on Good Morning Washington(ABC7), July 23, 2019 DP Solutions Director of Strategic Operations, Ben Schmerler, visited Good Morning Washington to offer some helpful tips on how travelers c...
Customer story: Shell invests in safety with Azure
Smoking and wrong fueling procedures are just some of the safety concerns for Shell retail locations. In the past, Shell couldn't analyze the hours of video footage that were logged daily. But now, wi...