DP Solutions Newsletter

May 2018 Newsletter


Printer Friendly PDF

What's New

DP Solutions Now Offers SOC-as-a-Service in Partnership with Arctic Wolf



DP Solutions has teamed with Arctic Wolf Networks (AWN), a leading security operations center (SOC)-as-a-service company, to provide threat detection and response capabilities to protect against today’s advanced cyberattacks.


AWN CyberSOC™ service gives clients leading managed threat detection and response services to tackle the increasing dangers of advanced cyberattacks.


This service provides an enterprise-class security operations center, the most essential element of any modern cybersecurity strategy. The service includes the expertise of experienced security engineers who manage all security matters using the full spectrum of advanced defense mechanisms for prevention, detection and response. 

Contact your DPS rep to learn more.



Security Alert! Hackers And Cybercriminals Are Concentrating Their Attacks On Businesses Like Yours.

Is Your Cyberprotection Up-To-Date? 


bigstock-Young-hacker-in-data-security--168105173Technology exists in a state of constant flux. The most popular gadgets turn obsolete within a year or two, the sophistication of the hardware and software we use increases exponentially with each passing month and the digital foundations of modern society are almost continuously supplanted. Every day, there’s a new device to contend with, a fresh update and an addendum to the already dizzying array of features at our fingertips.

It’s a thrilling world full of possibility and potential, but our dependence on these ever-changing technologies comes at a price. The overlay of the Internet on all aspects of our lives is fraught with vulnerabilities that criminals are eager to exploit. Though new protective measures are developed at the same breakneck speed as the software they guard, so are new ways to penetrate and circumvent these defenses. It’s estimated that 978,000 new malware threats are released with each passing day. It’s clear that “up-to-date” can no longer be an accurate descriptor; it always describes a system one step behind the newest development.


Today, cybercriminals are casting a wider net and catching more hapless victims than ever before. We read about the most costly of these breaches in the news each morning, including Equifax, J.P. Morgan, Home Depot, Yahoo!, Verizon, Uber and dozens more.

But these high-profile incidents don’t even comprise the majority of attacks. According to Verizon’s 2017 Data Breach Investigations Report, 61% of breaches occurred at small businesses, with half of the 28 million small businesses across the United States succumbing to a digital strike. Even scarier is the fact that UPS Capital reports that 60% of these businesses shut down within six months of a breach.

It’s a bleak reality to come to terms with if you’re a business owner. The truth is that it’s almost a statistical certainty that hackers will come for your data, and when they do, they’ll likely be using techniques nearly unrecognizable from today’s malicious flavor of the month.


How can you possibly prepare for something that is constantly changing? The answer is sustained attention, vigilance and resources directed toward protecting all that you’ve worked so hard to build.


While it may be impossible to foresee exactly how hackers will try to penetrate your business, it’s well within the means of most businesses to implement comprehensive security solutions to give your organization a fighting chance.


It’s vital to realize that, unfortunately, security protocols aren’t a set-it-and-forget-it proposition. To respond to the evasive and increasingly sophisticated tools being shared throughout the enormous hacker community, you need an equally sophisticated and regularly updating security system. For nearly every one of the 978,000 fresh new malwares developed daily, there are patches and updates designed to address them – strategies and techniques to outsmart even the most devious of criminals.


Just because you don’t have the resources of a massive corporation doesn’t mean you need to be low-hanging fruit for well-funded and highly organized cybercrime rings. Hackers assume that a business like yours is too tiny and ill-informed to prepare for even a simple phishing scam, and they’re usually right. But if every business owner put just a little more effort into securing their data, you can bet attacks would be curbed. And if every small business pledged to implement a professionally managed security protocol, we would see the frequency of these hacks diminish drastically.


There’s a lot for business owners to think about during a year as chaotic as 2018, but your top priority should be the basic security of your company. Invest your time and resources into building a foundational blockade for potential threats, and you can rest assured that your livelihood is safe from digital collapse.



Guest Article 


4 Steps To Finding Your Company’s Diamonds In The Rough

Andy Bailey


Executives are always looking to inject “fresh blood” into their teams. They’re on the hunt for shiny new talent to be that secret ingredient their organizations are missing. But in my numerous coaching sessions with entrepreneurs and leaders across the country, I found that an external search should usually not be the first step. Instead, I suggest that businesses look internally for hidden, untapped assets within the company. Here are four steps to start uncovering your diamonds in the rough.


  1. Don’t hire to fit a title.

It may be the way business has been done for half a century, but that doesn’t mean it’s right. You need to look at the individual strengths of each candidate and determine if he or she is right for your company and culture.


Make sure that you have a process in place to make hiring efficient. And as a part of that process, take time to identify those creative and out-of-the-box individuals you already have on your team. Ask pointed questions of everyone you consider for a given role, because this allows you to get a sense of how they think.


  1. Mine for the gems.

As you refine your hiring methods, you’ll likely discover that the talent you’re looking for might be right under your nose. Dig into your roster of existing team members. Create a company-wide survey for those interested in taking on creative or challenging initiatives, and give them the opportunity to be considered. The true innovators know what they can bring to the table, even if they’re currently not in a role that’s a perfect fit. If you give them the opportunity to shine, they’ll come forward.


  1. Refine and polish.

Once you’ve identified your gems, spend some additional time with them. Find out what inspires and motivates them. You may decide to modify your team member’s role or transfer some responsibilities to others in order to better utilize your talented individual’s strengths and unleash their creative prowess. Just make sure to set clear expectations with each person, explain why you’re making the change and empower them to do what they do best.


  1. Formalize your process to find more gems.

This isn’t a one-and-done process. It’s important to meet regularly with people to find these hidden assets. Consider handing out surveys and holding brainstorming sessions regularly as part of your company culture. That way, new team members will come on board knowing there’s an opportunity to shine in new ways, even if it’s not what they were originally hired to do.


Focus on embracing and developing internal individuals with relevant skill sets before hiring. I guarantee there is a huge number of underutilized assets within your organization. Give them the space to shine brightly. 

AndyBailey HS (105x140)As the founder of Petra Coach, Andy Bailey can cut through organizational BS faster than a hot knife through butter, showing organizations the logjams thwarting their success and coaching them past the excuses we all use to avoid doing what needs to be done. Andy learned how to build great organizations by building a great business, which he started in college. It then grew into an Inc. 500 multimillion-
dollar national company that he successfully sold and exited.


Free Report:
The 7 Most Critical IT Security Protections Every Business Must Have In Place NOW To Protect Themselves From Cybercrime, Data Breaches And Hacker Attacks

Eighty-two thousand NEW malware threats are being released every day, and businesses (and their bank accounts) are the No. 1 target. To make matters worse, a data breach exposing client or patient information can quickly escalate into serious reputational damage, fines, civil lawsuits, and costly litigation. If you want to have any hope of avoiding a cyber-attack, you MUST read this report and act on the information we’re providing.

Get The Report

anti-spam Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.

Client Spotlight: Cove Property Management




Cove Property Management (Cove), headquartered in Annapolis, MD, is an Accredited Management Organization® (AMO®) that provides residential property management services including accounting, human resources, marketing, construction management, asset management, due diligence and consulting. Cove’s apartment portfolio includes market rate, affordable, senior, student and fee-managed assets.


Cove was formed in 2008 in order to provide first class property management to a select portfolio of multifamily properties in the Mid-Atlantic market.

Cove offers a full suite of property management services, led by a highly qualified team and driven to be responsive, proactive and thoughtful. Cove is comprised of Certified Property Managers and owners of multifamily properties who are focused on the daily management of its residents’ properties.


Currently Cove’s portfolio includes 15 apartment communities in the Maryland, New Jersey, Washington D.C. metro and Baltimore areas totaling 1997 apartment homes.


Cove recently joined DP Solutions Managed IT Services plan, which includes 24x7 service desk support, monitoring and proactive maintenance, along with mobile device management and Workspace as a Service (WaaS), which provides secure, anytime, anywhere cloud-access to their apps, email and data.


To learn more about Cove Property Management, visit www.covepm.com.