DP Solutions Newsletter

August 2022 Newsletter


Printer Friendly PDF



Live Pizzacast Webinar:

The State of the Cyber Insurance Market

Untitled design (7)

Wednesday, August 31 at 11AM

With special guest speaker

Ben Bitterman from Arctic Wolf


Sign Up Today


*All attendees will receive a

$25 Domino’s Pizza gift card for attending



Welcome New Clients!







Creating A Safe Online Presence For Your Children

In 4 Easy Steps



Children in this day and age are growing up in a technological climate that many of us never could have imagined 20 years ago. Kids who were born during the last decade will never know a world where everyone doesn’t have a cellphone on them at all times. They’ll never truly understand what the world was like before the Internet. 


This rapid development of technology has made it so our kids’ online and offline lives are merged into one. The conversations they have on social media or over texting are the exact same as the conversations they would have in person. They have direct access to just about anyone at a moment’s notice and can see directly into other people’s lives through social media. Additionally, many kids are stumbling upon graphic content and some pop-ups are even encouraging them to click on inappropriate material. 


To put it simply, it’s becoming much more difficult to keep our children safe online. They’re able to share information, pictures and videos at a moment’s notice, and oftentimes, the parents are unaware their children are participating in these behaviors. Considering that 40% of American children receive cellphones before they turn 11, it’s important that parents do everything in their power to ensure their children stay safe online. 


If you’re unsure of what steps you need to take to ensure your children’s safety online, don’t worry – we’ve got you covered. 


Slowly Introduce Digital Media.
Fostering a safe online environment for your children starts at an early age. They should be introduced to the online world when they’re young and taught the safest way to use it. Once they’ve been introduced to the Internet, set time constraints and do everything you can to ensure their technological devices aren’t interfering with their sleep.


Think Before You Post.
Many children will get their first experience with social media thanks to their parents, so lead by example by making appropriate, safe posts that do not reveal personal information. There should be no graphic or mature content on your feed as well, especially if it’s public. 


Encourage The Use Of Strong Passwords.
Make sure your children know how to create strong passwords as well as the dangers of having a weak password. Teach them to use
different passwords for each account and to never share their passwords with anyone outside of the family. 


Set Up Parental Controls.
Parental controls are great when it comes to streaming services and computers, but did you know that most smartphones also come with parental controls? On your child’s smartphone, you can set parental controls for time limits as well as content restrictions. You can even choose which specific websites they’re allowed to visit while blocking everything else. This is a great way to prevent them from stumbling upon inappropriate or harmful content. 


The Internet can be an informative and enjoyable place for your children if you take the proper precautions. Teach them the basics of the Internet and preach safety above all else.


CartoonStock_537070_CS474271 (1)


Guest Article 


4 Ways Smart People Blow The Close



Picture this scenario: You’ve been working closely with a potential client for the past few weeks. During that time, you’ve been proactive and communicative. Anything that client needed, you took care of, but when it comes time to officially close the deal, something happens that makes the client unsure of whether they want to proceed with your business or not. 


This is a situation I see all the time. I work with incredibly smart people who get asked to help some of the most successful CEOs and boards in the world solve their top leadership problems. When my colleagues are actively doing the work, they appear to be confident, caring and, at times, daring. But when it comes time for them to sell the work, many struggle. 


Over the years, I’ve witnessed four common ways smart people fail to close deals.  


Hit Mute

I recently had a meeting with a billionaire CEO who was at the peak of his industry. He told me and my colleague about his concerns about hiring and leading talented teams across his portfolio of businesses. This was an easy sell for us. After the CEO talked for about an hour, he asked my colleague a question to wrap up the conversation. Instead of answering promptly, my colleague’s mind went blank and he didn’t recover for 20 seconds. Though we recovered in this situation, clients want help wrapping up a conversation and turning it into an action plan. 


Don’t Impose

I sat in on another meeting with a different colleague and CEO that went really well. My colleague was providing valuable and insightful advice in this meeting but let the meeting end without making an action plan or closing the deal. I asked him why he didn’t close, and he said he didn’t want to impose. We ended up giving this CEO hours of free help before he officially hired us. 


Too Complex

An issue that many smart people face is being overly complex and dominating the conversation. They have this desire to prove how smart they are and try to prove it in these meetings. When you try to overpower the conversation while discussing complex topics, you end up overwhelming or even insulting the client. Slow down and be conversational. 


Win The Argument

When you’re trying to close a deal, the conversation should not be argumentative. I once sat in on a meeting where my colleague put his hand up and told our client, “Stop right there. I don’t think your logic holds.” It did not go over well. To serve your clients, you need to understand and respect them. 





Dr. Geoff Smart is the chairman and founder of ghSMART, a leadership consulting firm that exists to help leaders amplify their positive impact on the world. Dr. Smart and his firm have published multiple New York Times best-sellers. He stays active in his community and has advised many government officials. 







Blog Offer:

Common Attack Types On APIs

The number of Application Programming Interfaces (APIs) deployed within organizations is multiplying. According to this survey, 26% of businesses use at least twice as many APIs as they did a year ago, increasing the attacks on APIs. APIs are integral to any application, making them a prime target for attacks.

The Open Web Application Security Project (OWASP) has published the Top 10 API security attacks associated with API vulnerabilities which this blog will discuss.

Get The Article Here:


Should I Pay The Ransom If I'm The Victim Of A Ransomware Attack?


Nobody wants to be the victim of a ransomware attack, so it goes without saying that the best thing you can do is avoid it in the first place.  But if you are facing a demand for money from a hacker in exchange for ending a ransomware attack, should you consider paying?


The answer is that you should do everything you possibly can to avoid paying the ransom.  First of all, while there is so called “honor among thieves”, there is no guarantee that paying a ransom will benefit you in any way.  But more importantly, you might not have to. 


Ask yourself the following:

  • Are the data and systems that are locked up unrecoverable through means other than paying the ransom? A good system to manage backups and disaster recovery could address this.
  • Is the system that is locked up of any importance in the first place? What is lost if the machine is restored from scratch
  • What kind of liability do we have with the data on the compromised system?

In other words, what kind of hostage is the kidnapper holding?  If they don’t have real leverage over you, you don’t want to pay the ransom.  However, if you have no other choice, you might be forced to pay up. 


Do yourself a favor and try to avoid being in this position in the first place.  Maintain your systems, utilize robust security tools to fight back against advanced threats, train your staff and manage your systems in a way where system recovery is always an option.



Click Here to Subscribe to Our  Weekly IT Security Tips Series