WELCOME TO OUR BLOG

Do you allow guests to access your WiFi network?

Do you have guest access on your company WiFi network separate from your main network? Or do you simply give out the same password and access point information that your employees use? If you give out your password, you’re allowing a guest to play in the same sandbox where your staff accesses sensitive data.  What if your guest, knowingly or unknowingly, has been infected with some kind of worm?   

View More »

Move to the Cloud with Azure

In this week's video, DP Solutions looks at four companies--ASOS, British Airways, Rockwell Automation, and GEICO--to learn how the Microsoft Azure cloud helps them succeed in their respective industries. Although each of these companies has rigorous, specialized data requirements, Azure delivers the capabilities and massive scalability they need to step up their operations. Let us show you how Azure can do the same for you.
View More »

The Importance of Security Awareness Training

Every organization needs to ask a fundamental question about their staff: Do they know what to do immediately upon discovering a virus, e-mail threat or other cyber-security issue? 

View More »

Don’t just throw away your old computer

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information.

View More »

Why is it so important to have unique passwords for all your online accounts?

Password complexity is a given in the current age of cyber-threats, data breaches and other security incidents. At the same time, it can be very difficult to manage a series of different passwords for different websites and devices. 

View More »

Make sure your road warriors are productive and secure when working remotely

Do you connect remotely to get some work done in the evenings, weekends or when on the road? For many, the answer is yes.  Technology has provided us with so many ways to be productive anytime and anywhere. 

View More »

Risks from the Internet of Things (IoT)

Modern technology has radically changed how we work and live. Almost everything we take for granted in our daily lives, from the copiers and multi-function printers in our office, to the refrigerators, light bulbs and locks on our doors, are evolving to have broader capabilities using the power of networks to make our lives generally better.

View More »

Don’t overshare

Phishing attacks are designed to exploit the ignorance of end users to get them to perform tasks they wouldn’t otherwise do.  It’s the work of con-men. 

Here’s one example: a secretary gets an e-mail from her boss – who is traveling – to send him scanned copies of all the W2s the company issued at the end of January. The message appears to come from her manager, including having what looks like his actual e-mail address when she looks at in Outlook. 

View More »

Don’t take visitors for granted

Imagine a scenario where an office secretary unknowingly gave some of her law firm’s most private data to a gentleman dressed as a Comcast technician. He had bought a Comcast Cable polo shirt off eBay, dressed in khakis with a tool belt, and told the secretary he was there to audit their cable modem specifications and take pictures of the install for quality assurance. Well, that actually happened.  It’s not far-fetched. 

View More »

How to distinguish a cheap router or firewall from a business class device

Routers and firewalls can be confusing.  Anybody who wants to have a network with Internet connectivity will typically have at least one in place. 

A router like the one you’d purchase at a big-box store is designed to serve the needs of home, not the needs of business. It’s designed to provide basic connectivity and share it with others.  They tend to have limited configurations, and for most home users you really don’t need a sophisticated device. 

View More »