Services Offered

Contact Us

Drop us a line!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please feel free to contact us.

We love our customers, so feel free to visit during normal business hours.

dbtechnologies

db@dbtechnologies.net

(859) 983-2767

Hours

Monday - Friday: 9am - 5pm Saturday: By appointment Sunday: Closed

FAQs you need to know

FAQs

Who is ultimately responsible for IT security?

Since security is primarily a risk management issue, responsibility ultimately belongs to the asset owner or, in larger companies, senior officials. They are the ones who will have to answer for lost or damaged intellectual property. This could result in the loss of personal assets following lawsuits and other legal ramifications.


How do I know if our organization is secure enough?

The short answer is that the level of risk management and associated security controls you need is based on the level of risk your organization can afford. Security is an ever-evolving challenge and most organizations need a security management plan that is based on periodic security assessments and ongoing monitoring and management.


My company is small and we are not subject to compliance requirements - should I worry about IT security?

Security needs depend on what assets you have at risk: client information, intellectual property, etc. The protection of any consumer data (payroll, loan, tax returns, patient record, credit card number, etc.) is regulated, regardless of the industry. Many small businesses may have more compliance requirements than they actually realize. Even if not subject to law suits or fines resulting from a data breach, the impact on business reputation can be equally disastrous for a business, regardless of their size. Once you determine your risk, you can determine what you need to worry about from an IT security standpoint.


How often should I have a third-party perform a risk assessment?

Best security practices would involve having a risk assessment completed on a yearly basis. This will provide a gap analysis and then you can create and/or update an annual security management plan.


What is the difference between a vulnerability scan and a security risk assessment?

A vulnerability scan can identify known vulnerabilities and potential risk levels at a single point in time. However, periodic vulnerability scans alone do not adequately address a client’s risk management needs. A security risk assessment involves a more comprehensive review of risk factors and probability of occurrence, as well as an analysis of existing IT security controls. It can also provide the basis for an annual security management plan.


Our firewall is old and end of life. Would you recommend a new firewall for us?

Though a firewall is one of many security controls needed to protect data assets, a plain firewall is not enough to adequately defend your business today.  We would recommend a new perimeter security system with firewall and intrusion detection with prevention capabilities. This provides added intelligence to monitor traffic passing through the firewall to identify and block security threats. Additional perimeter security controls are also recommended to help protect data assets against email and web security threats.


Our antivirus software is coming up for renewal. Are all antivirus software packages the same?

Not really. Some antivirus software packages do not update their signatures often enough to keep up with the evolving threats. Others make your workstations run slowly. Today you need more than just antivirus software. You need end point data protection to help guard against more comprehensive treats.