Category: Attacks | Scams

You focus on running your Business, DBC2 Secures IT!

Essential Cybersecurity Toolkit Landing Page

5 types of social scams your employees need to know about: phishing, baiting, quid pro quo, pretexting and tailgating. Define each with our helpful guide here. http://datto-content.amp.vg/web/435dhfh4p2ev

Business Guide to Ransomware – Landing Page

Do you know some of the common types of #ransomware and what to do in the event you encounter it? We can help you #stopransomware. http://datto-content.amp.vg/web/d1z9vzolguzwd

Ransomware – Everyday Devices

The best way to prepare employees to stop #ransomware attacks is to train them. Train new employees at orientation and all employees bi-annually.

Ransomware Report – Landing Page

The average cost of downtime (loss of productivity) from a single #ransomware attack is about $46,800. #stopransomware http://datto-content.amp.vg/web/3xdeex4k6b4d

Essential Cybersecurity Toolkit Landing Page

Teach employees about social scams so they know what to expect and how to spot them. Prepare your team here. http://datto-content.amp.vg/web/dl6flv023vitv

Business Guide to Ransomware – Landing Page

Provide clear instructions on what to do if your employees encounter a potential #ransomware lure. Learn how here. http://datto-content.amp.vg/web/ck3nxh90qi8ps

Ransomware – SaaS

All it takes is one click by an employee to put your data in jeopardy. Protect your business with a Ransomware Protection and Recovery Solution. Contact us to learn more.

Ransomware – the business of cyber crime

This is a great clip of Kevin Mitnick, at one time the most wanted hacker in the world, demonstrating how ransomware is delivered and the most common targets. Scary stuff!

Data Breach

Capitol One Data Breach

The Capitol One Data Breach is just the latest in the news. While we are only hearing about it now it happened in March and affects over 106 million people

Amazon Scam | A New Twist

This new twist for the Amazon scam does not contain any links but does have an attachment which includes malicious code.