DG Technology Managed Services

Cyberattacks are increasing at an alarming rate. Today, organized cybercrime is the world’s most profitable and fastest growing business with a very low barrier to entry. The greatest risk that organizations now face is not around operations, product development, talent scarcity, or competition for customers, it is centered on data security. Data is the lifeblood of every organization. Without it, business life ceases.

 

To minimize business disruption and ensure operational continuity, forward-thinking organizations have realized the business, not just the IT department, must make security risk management a priority – a core strategic imperative. Our Managed services put a “protective forcefield” around your business by protecting the data on your most vulnerable cyberattack surfaces – every laptop, desktop, tablet, and smartphone you use to do business. These devices, or endpoints, are the everyday entry points for data creation, and the everyday entry points for cybercrime.

 

The core of security risk management focuses on what cybercriminals consider “low hanging fruit” – software vulnerabilities and human behavior. Our program solves for both. Now we offer your organization an arsenal of data security services to help mitigate your cyber risk and allow your business to focus on what matters most to you: running your business – uninterrupted.

 

Endpoint Detection and Response

Cybersecurity relies on three components: people, process, and technology. Technology alone will not protect a business. It’s important to understand that relying on a single piece of technology (or two) will not keep you safe. On average, a hacker is in a company’s system for months before they are detected – no anti-virus tool will protect against that.

 

Endpoint Detection & Response (EDR) is security software that replaces or augments legacy antivirus by uniting endpoint protection, detection & response, remediation, and threat hunting into a Windows, Mac, Linux single agent solution.

 

Ask yourself:

Do you actively monitor your network for threats?

Do you have an Incident Response (IR) plan in place?

Do you use endpoint protection tools?

 

If you answered no to any of the above questions, consider our Managed Endpoint Detection and Response service.

 

What is Managed EDR?

Managed EDR is the next generation anti-virus protection managed and monitored 24/7 365. By using a high level of AI and automation, Managed EDR helps organizations identify potential threats and respond to them by:

  1. Collecting data from an organizations’ endpoints that indicate a threat
  2. Analyzing the data to identify normal usage and threat patterns
  3. Automate responses to threats to contain them and notify security personnel
  4. Provide digital forensics to document and search for suspicious activities

EDR monitors laptops, desktops, and servers, as well as tablets, smartphones, and Internet of Things (IoT) devices; every endpoint on an organization’s network. As businesses face more and more cybersecurity threats and the number of endpoints grows, Managed EDR provides an added layer of security with automated threat analysis and response.

 

How will Managed EDR impact your organization?

Our service delivers value to your organization through operational reliability, reduced business impact and alignment of IT and business goals. We mitigate your risks from cyberattacks and malicious software for you. This reduces your total cost of ownership through focus on well-managed endpoints.  We provide simple remote deployment by device or device group, ensuring bandwidth-friendly mass rollout and signature file updates. Additionally, we can schedule the deployment and reboots at your discretion.

 

Where do you start?

Contact us and let’s start by reviewing your WISP (written information security plan) or let us help you write one. After reviewing your WISP we will work together to address your current security posture weakness and offer solutions.

 

DG Technology Consulting, LLC Announces Commitment to Raising Awareness About the Importance of Safeguarding Consumer Data by Becoming a 2021 Data Privacy Day Champion

This year’s initiative emphasizes cultivating trust among consumers by adopting data privacy frameworks and promoting transparency around data collection practices

Tampa, Florida January 28, 2021 — DG Technology Consulting, LLC today announced its commitment to Data Privacy Day by registering as a Champion for the campaign. As a Champion, DG Technology Consulting, LLC recognizes and supports the principle that all organizations share the responsibility of being conscientious stewards of personal information.

Data Privacy Day is a global effort — taking place annually on January 28th — that generates awareness about the importance of privacy, highlights easy ways to protect personal information and reminds organizations that privacy is good for business. This year, we are encouraging individuals to “Own Your Privacy” by learning more about how to protect the valuable data that is online, and encouraging businesses to “Respect Privacy”, which advocates for holding organizations responsible for keeping individuals’ personal information safe from unauthorized access and ensuring fair, relevant and legitimate data collection and processing.

According to a Pew Research Center study, 79% of U.S. adults report being concerned about the way their data is being used by companies. As technology evolves and the pandemic continues to influence how consumers interact with businesses online, data collection practices are becoming increasingly unavoidable, making it imperative that companies act responsibly.

“In recent years, we’ve seen the impact of more global awareness surrounding the abuse of consumer data, thanks to sweeping privacy measures like GDPR and CPRA,” said Kelvin Coleman, Executive Director, NCSA. “And while legislative backing is key to reinforcing accountability for poor data privacy practices, one major goal of Data Privacy Day is to build awareness among businesses about the benefits of an ethical approach to data privacy measures separate from legal boundaries.”

The National Cyber Security Alliance has offered up the following tips to help guide individuals and businesses to better data privacy practices, such as:

For Individuals:

 

For Businesses:

 

For more information about Data Privacy Day 2021 and how to get involved, visit https://staysafeonline.org/data-privacy-day/.

 

About DG Technology Consulting, LLC

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks. We use a proven methodology that focuses on thoroughly understanding your needs and challenges, enabling us to recommend the most appropriate tools and technology for you.

 

About Data Privacy Day

Data Privacy Day began in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the Jan. 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. NCSA, the nation’s leading nonprofit, public-private partnership promoting cybersecurity and privacy education and awareness, leads the effort in North America each year. For more information, visit https://staysafeonline.org/data-privacy-day/.

 

About the National Cyber Security Alliance

NCSA is the Nation’s leading nonprofit, public-private partnership promoting cybersecurity and privacy education and awareness. NCSA works with a broad array of stakeholders in government, industry and civil society. NCSA’s primary partners are the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) and NCSA’s Board of Directors, which includes representatives from ADP; AIG; American Express; Bank of America; Cofense; Comcast Corporation; Eli Lilly and Company; ESET North America; Facebook; Intel Corporation; Lenovo; LogMeIn; Marriott International; Mastercard; MediaPro; Microsoft Corporation; Mimecast; KnowBe4; NortonLifeLock; Proofpoint; Raytheon; Trend Micro, Inc.; Uber: U.S. Bank; Visa and Wells Fargo. NCSA’s core efforts include Cybersecurity Awareness Month (October); Data Privacy Day (Jan. 28); STOP. THINK. CONNECT.™, the global online safety awareness and education campaign co-founded by NCSA and the Anti-Phishing Working Group with federal government leadership from the Department of Homeland Security; and CyberSecure My Business™, which offers webinars, web resources and workshops to help businesses be resistant to and resilient from cyberattacks. For more information on NCSA, please visit https://staysafeonline.org.

 

Do you have concerns about your remote work security?

Now that the sudden and unexpected shift to working in virtualized offices is behind us and employees are settling into the new normal of working from home, it’s time to evaluate whether your company is set up for long-term success. If your organization is new to working virtually, then you may encounter some potential potholes as you navigate this transition. Our Remote Workforce Checklist is designed to help guide you through the sometimes complex adjustment to a virtualized workplace while auditing your business’ remote work security practices.

While you may have an array of regulations and protocols in place for your infrastructure, cybersecurity, and project management in the office, unforeseen challenges can emerge when you examine your guidelines through the lens of virtual work.

Provide secure, uninterrupted access to your networks

Take your infrastructure, for example. Does your current infrastructure support remote access for employees who are logging in from home? Do you own the connection, and if you don’t, what do you need to do to ensure your employees have reliable, uninterrupted, and secure access from different locations? These are just a few of the infrastructure questions we encourage companies with virtualized offices to ask.

Virtualized offices bring new cybersecurity risks

You’ll also want to review your company’s cybersecurity efforts. Are your networks secure for remote access? Are your employees connecting to the network via secure devices? Have your identity and access protocols been updated with remote work in mind? Think about sending out refreshed guidelines about phishing scams, malware, and the security of home Wi-Fi connections. Lastly, if you find yourself in a situation where you’re reducing your workforce, have you worked through a comprehensive plan for terminating network access and recovering hardware?

Stay productive and collaborative, no matter where your team is located

It’s critical to ensure productivity and support remain high in virtualized offices. Do your employees have access to responsive support for network issues? Do you have guidelines in place for how to troubleshoot tech issues that arise? Evaluate updating your protocols now so your employees aren’t left scrambling to solve technical issues on their own.

Working from home doesn’t mean working alone. Ensure your project management and collaboration procedures are updated with virtual work in mind. Consider using tools like Microsoft Teams, Cisco Webex or Zoom to stay connected, and whether you should provide access to project management tools like Slack, Basecamp, Monday.com, or Jira to help your employees stay organized, on top of projects, and up-to-date.

Our working world has changed and it’s crucial for your business to adapt and shift along with it. If you give consideration to these critical questions and lay out a comprehensive framework for working from virtualized offices now, your team and your business will be well prepared and productive anywhere.

 

Audit Your Remote Work Security

Most everyone understands that an annual physical checkup is the best way to stay fit and guard against potentially harmful illnesses. Or that taking your car in for periodic tune ups is the most effective way to ensure your vehicle runs reliably over the long haul. The same concept applies to your IT infrastructure.

IT leaders striving to protect their organizations from outside threats are increasingly looking to optimize their security with a centralized integrated management system based on open architecture. A centrally managed approach makes the enterprise security infrastructure more agile, effective, and proactive. It improves the efficiency of security teams and drives down the overall costs of security management.

Increasingly, organizations have turned to McAfee’s ePolicy Orchestrator (ePO) as their centralized security management platform. While that’s a good start, you need to be vigilant in ensuring your ePO is providing the threat defense you need. The best way to do that is with a comprehensive ePO health check.

DG Technology’s ePO Health Check Service provides an analysis of your existing ePO environment to make sure it is operating effectively and to identify any possible misconfigurations. When configured and deployed correctly, your ePO delivers a coordinated, proactive defense against malicious threats and attacks, and helps keep protection up to date.

Reducing your attack surface

A health check often results in “quick wins” that reduce your attack surface and capture some payloads and techniques that hadn’t been identified before. The checkup covers the ePO console, associated ePO components, Virus scan (VSE), and Intel Security Encryption.

The key tasks performed during the check include:

In addition, you will get a complete review of your existing ePO deployment, defined best practices for AV policies, complete documentation of your ePO configuration, and identification of any pain points or non-functioning features.

Provides a go-forward road map

Following the checkup, you will receive a detailed roadmap to help you move forward and ensure the stability of your security infrastructure. The report will identify your bandwidth utilization by Web 2.0 applications, potentially risky applications and anonymizers, malware downloads, malicious sites, and bot-net activity, vulnerability exploits (IPS) and Advance Evasion Techniques, and a documented set of remediation recommendations.

You have taken an important first step by implementing McAfee’s ePO as your security foundation. Make sure it is still delivering the level of security you expect. Contact DG Technology to set up your free network security health check.