6 Discontinued Technology Tools You Should Not Be Using Any Longer

Discontinued Technology

At D2 Solutions, we want you to to know that one constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, get old and are retired. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. You shouldn’t use…

Read More

How Using the SLAM Method Can Improve Phishing Detection

Free vector graphics of Hack

Security awareness training tends to focus on phishing for a reason. For the past decade or two, all types of attacks have been delivered through this method. Phishing emails are used to launch ransomware, credential theft, database breaches, and more. At D2 Solutions we are here to help your company improve your Phishing Detection methods…

Read More

How Often Do You Need to Train Employees on Cybersecurity Awareness?

Free illustrations of Security

A phishing training session has been completed. Employees are also taught how to spot phishing emails. I’m glad it’s going well for you. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. Cybersecurity awareness training is important.  The same information is being…

Read More

5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office

Never Do On A Work Computer

At D2 Solutions, we want you to know that “Hybrid office” is the new buzzword you’ll hear used in business discussions. It’s the mix of having employees both working at the office and working from home. This has become more than a buzzword and is now the reality for many companies. There was a survey…

Read More

Top 5 Mobile Device Attacks You Need to Watch Out For

Displaying Top 5 Mobile Device Attacks You Need to Watch Out - raw image.jpg

At D2 Solutions, we realize that smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. As employees move to remote work. we’re seeing the takeover of many activities that used to be performed on traditional computers. Now,…

Read More

Signs That Your Computer May Be Infected with Malware

Hacker, Hack, Anonymous, Hacking, Cyber, Security

At D2 Solutions we’ve found that it takes approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses Ransomware Spyware Trojans Adware Key loggers And…

Read More