Smiling woman wearing headphones Smiling woman wearing headphones

Learn

Learn about your I.T.

Knowledge is power

This is our education hub, where you can learn more about your technology, what different services are, and the best ways to solve your technology issues.

 

Webinar on demand

Sign-up for our webinar, & get notified when we post a new video!

Blogs

What’s the Deal with Multifactor Authentication?

By Ian Richardson, Founder, Doberman Technologies LLC   Multifactor Authentication (MFA) is a big deal these days. Malicious actors from nation states like Russia, active…
April 7, 2022
Doberman Technologies

Password Managers – 6 key benefits

Passwords are a part of all of our professional and personal lives, a “necessary evil” – but they don’t have to be a chore to…
January 3, 2022
Doberman Technologies

What is the Dark Web?

What is the Dark Web, and why should you monitor it? The Dark Web is difficult to define without relying on the famous “think of…
September 7, 2021
Doberman Technologies

5 ways to improve your small business cybersecurity today

5 Ways To Improve Your Small Business Cybersecurity Today Implement Passphrases instead of passwords Stop reusing passwords across websites Develop common sense policy and procedure…
August 3, 2021
Doberman Technologies

Doberman Technologies LLC Named to ChannelE2E Top 100 Vertical Market MSPs: 2020 Edition

Fifth-Annual List Reveals Leading MSPsIn Healthcare, Legal, Government, Financial Services, Manufacturing & More April 23, 2020, Mason, Michigan – Doberman Technologies LLC has been named…
April 23, 2020
Doberman Technologies
More

Frequently asked questions

You might be wondering…

How does Cyber Security Work?

Cyber Security is a multi-step process in a small business. Doberman utilizes the NIST cyber security framework, which consists of 5 major pillars – First we work as a team to IDENTIFY what is important in your business, what needs to be protected? Next we use technology, systems, and processes to PROTECT those valuable data. We then set alerts and monitoring to DETECT if something goes amiss with our protection. Our team will RESPOND to the alerts that are detected. Last, but not least, we utilize our Data Guardian service to allow for guaranteed RECOVERY should all other safety measures fail.

Which antivirus is the best?

An antivirus, or any security software for that matter, is only as good as the process used to install, configure, and maintain it. Without a plan, the software becomes a false sense of security.

What is ransomware?

Ransomware is a type of malicious software used by a bad actor to disrupt your ability to use your computer network. The ransomware “encrypts” your data, making it unable to be used for business activity. Typically this is followed by a “ransom” to give you access back to your data.

What’s the strongest Multifactor to use?

Similar to antivirus, the systems and processes AROUND your multifactor software are much more important than the software itself. It is worth noting that having your multifactor send a text message (Or SMS) to your cell phone has well documented security holes, and should NOT be counted as a secure method.

Why is multifactor important? It’s a huge inconvenience to me!

People have the tendency to use the same username (their primary work email) for every system they access. Out of the gate, if a bad actor gets your email, they have ½ of the equation to gain access to sensitive systems. If you happen to use the same password, or similar passwords, for multiple websites, and if any of those websites is compromised via a security breach, you can have a big problem. In addition – multifactor, by needing a device or smart phone to “accept” the request to access the website in question, means a bad actor not only would need your password, but your mobile device as well.

What’s the benefit of me using a password manager?

Passwords are the primary way of proving your identity to a third party, like your bank or supplier. If you use the same password for multiple websites, a bad actor only needs to find the website with the weakest security to gain access to multiple systems as you. Its not terrible if someone breaks into the florist website and orders a few bouquets of flowers, but if they gain access to your primary line of business software, email, or bank the damage can stack up quickly. A password manager makes it easy to use long, randomized strings of alphanumeric and special characters for passwords, while you remember one strong passphrase to access the manager itself. You can make it extra secure by securing both the password manager, and the third party websites, with a well configured MFA system.

Is the cloud right for my business?

It depends. Cloud systems shift the risk and capital expense of “infrastructure” (mainly processing power and storage of data) to a third party datacenter. You’re changing a capital expense into an operating expense, which can have financial and tax benefits. The cloud doesn’t save any “hard dollars” – but it does change the equation of risk and cash outlays. Depending on your business goals and strategy, cloud can be a smart move for your business.

Do I need to back up my data that is in the cloud?

Yes! The best way to think about the cloud is that it is someone else’s server, in someone else’s building. It’s still YOUR data, and it can still be deleted, corrupted, lost, or stolen. It’s like storing your car in a public parking garage. It can still be broken into, damaged, or stolen – so you still want to carry insurance to protect that asset. Your data needs protection, just like your car.

Contact Us

"*" indicates required fields

Schedule your call

Have questions about our services or want to talk about your technology?

Give us a call today or fill out the form!

205 Mason St

Mason, 48854