DKBInnovative Named To Inc.5000 2017 List Of Fastest Growing Companies

Here at DKBInnovative, we just learned that we are on the Inc.5000 2017 List of Fastest Growing Companies–and we are thrilled. In each of our thirteen years of business, we have given our maximum effort to the company mission. We committed to earning the trust of our clients by providing excellent service, cutting-edge technology support and vision, and to do it with kindness and appreciation.

Our growth over the last three years has been 161%, which has allowed us to increase our company roster to thirteen talented people. We offer managed IT services to a range of businesses, but we have developed two specialties, one in healthcare and one in oil and gas. All of our clients require the highest level of cyber security, and none of them can afford to have any down time due to faulty technology. We understand that with today’s internet possibilities, commerce is a 24/7/375 effort. Our motto is: ‘Whatever It Takes.”

I am so proud of our DKB Team, and our AWESOME clients. We will continue to strive to be worthy of our recent accolades and recognition.

DKBInnovative is comprised of dedicated, passionate, and hard-working IT professionals committed to providing the best IT services at the greatest value. They partner with clients to navigate any and all IT needs including complex network configurations, software vendor selection and management, and comprehensive security (including HIPAA compliance.) We focus on increased client efficiency and productivity so they can focus on getting their work done. Our motto is ‘Whatever it takes.’  Contact DKBInnovative at or by phone at (469) 828-2468.

DKBInnovative Talks to NBC5 About Laptop Safety

NBC5, the Dallas/Fort Worth affiliate, called DKBInnovative last week for IT expertise when they were researching a story about exploding laptops. Kudos to the producers of that story for being so thorough before presenting their piece, and thanks to our own Randy Haba for passing along a valuable tip to all laptop users. We don’t recommend that users buy laptop batteries online. Too often, as this news story shows, what you receive may not be quite the same as what you had before. The results can be dangerous. See the full story.

Every technology situation teaches us something new

Technology is so ingrained in our daily lives now, and individually we are responsible for knowing more and more about the technology we habitually use. Multiply one person’s use by the size of a business, and you can understand the responsibility of a business owner when it comes to his or her company’s whole information technology network. IT management services, like DKBInnovative, allow experts to be responsible for all kinds of safety in your workplace. We focus on new products and procedures for IT, and our business is to make sure that your business computer network is configured for optimal efficiency and productivity. On top of that, you have to also know how the use of outside personal devices like smart phones and tablets can impact the security of your company data. It’s complicated, but that is what fascinates and challenges us.

DKBInnovative is comprised of dedicated, passionate, and hard-working IT professionals committed to providing the best IT services at the greatest value. Having served 60+ hospitals and 200+ medical practices, they partner with clients to navigate any and all IT needs including security, network, software vendor selection and management, and comprehensive security including HIPAA compliance—with a focus on increased practice productivity. DKB clients focus on providing great patient care, not the business of IT.  Contact DKBInnovative at or by phone at (469) 828-2468.

Move From Fearful To Reassured

Which type of business leader are you?

One kind reads headlines about ransomware attacks and doesn’t know if he needs to take action and, if so, where to start to ensure that he is protected. The other kind knows the status of her systems, the protections in place, and whether the attacks seen in Europe apply to her systems, and knows that even if attacked, backups/restoration capabilities are at the ready.

Business leaders in the second group have ‘reassurance’. They know what they need to know, they know what’s most important, and they know their protections are in place and are up to the task.


  1. Deploy reputable, multilayered, endpoint security.  The best way to combat malware, including ransomware, is to never let it infect you to begin with. The key is to be proactive. Have next-generation endpoint security to protect from viruses that come through web browsing. Control your outbound traffic, protect system settings, and proactively stop phishing attacks through continuous monitoring and updating.
  2. Deploy backup and disaster recovery. If proactive lines of defense fail and you encounter a crypto-ransomware infection, your best choice is to recover data (through backups) and minimize downtime (through disaster recovery.) Have a cloud-based backup and disaster recovery (BDR) solution with data backups on site and off site. A backup is only as successful as the last recovery test, so be sure to monitor and perform test restorations often.
  3. Patch, patch, monitor, patch. Patch and keep your operating system, browsers, Adobe Flash Player, Java, MS Office, and other software up to date. The latest ransomware, like WannaCry, exploits vulnerabilities in unpatched software. This also means that legacy operating systems such as Windows XP and Vista, that do not receive weekly patches, should be replaced where possible.
  4. Create strong Windows policies. Using the power of access control and security features of Active Directory and having your computers in a properly secured Windows domain can prevent ransomware from installing. A best practice is to use your workstation without local administrator permissions. Log in with an admin account only when changes are needed. This approach will prevent malicious software from installing and encrypting your data.
  5. Educate users. Ninety-five percent of security breaches are caused by human error, and ransomware infections are no exception. As long as employees are unaware and uneducated on the risks of the Internet, malware will continue to thrive. Educate your staff on the dangers of ransomware, and how to recognize its warning signs. Services are available that simulate attacks by periodically sending employees fake phishing emails to see who is not following security best practices. It’s important that you have the technical support and the educational support.

Information Technology Seeking Long-Term Relationship With Your Practice

Any medical team in any practice will tell you that every day is a roller coaster of events and emotions, and only part of that comes from the patients. After the last appointment of the day, there is always follow up to do, no matter how efficient each practitioner and his/her team are. Electronic technology has been a boon to medicine—no doubt about that, but—not every practice will tell you that they love their IT systems.

Some practicing physicians can remember what a huge time-saver electronic dictation became when it was introduced. Post-World War II physicians were the earliest to use audio recording devices daily for patient encounter notes. This eliminated the time needed to sit down with a stenographer, who would document patient visits in shorthand then sit at a typewriter to transcribe those notes. Add a few billion more people to the planet and it is quickly apparent how critical information technology can be to the accurate, timely and inclusive workflow of any provider’s day.

Why, then, is there so much angst around today’s medical IT usage? While everyone seems to agree on the efficacy of having Electronic Health Records, secure patient portals, and social media outreach to the patient database, do medical centers know how to use the operating systems to their best time advantage?

“Part of our job as healthcare technology managers is to stay on the cutting edge of what’s new and what works,” said local medical IT managed services provider Keith Barthold of DKBInnovative. “When we think especially about embedded communications, there are several critical factors in play.”

Is it user-friendly?

We all know that if it’s hard to use, it won’t get used. If new medical technology takes too long to learn or will be hard to learn, user pushback will stall any progress such innovative programs can bring. According to studies done in the last few years, it was only a decade or so ago when 9 out of 10 doctors made patient chart updates by hand and kept a color-coded manual filing system. In March 2017, 67% of all providers reported using an EHR, a 1% increase over September 2016 (Source: SKA), but many providers will grumble that time spent learning computer programs means less time spent with patients.

“We have learned from being in the trenches that before learning any new computer programs in a practice, all complementary systems must be perfect. Do not take a physician away from his or her patients to learn computer stuff and then have to make connection repairs or network tweaks,” advises Keith Barthold. “Your managed service provider should be ready to explain the value of all recent technologies and to demonstrate how they will improve customer satisfaction and increase practice productivity. “

Year EHR Adoption Rate
2012        40%
2013        48%
2014        50%
2015        63%
2016        66%
2017        67%

 Security:  Ransomware is now a reportable data breach

Ransomware is on the rise, with reports that as many as 50% of U.S. based organizations were attacked by ransomware in 2016, and only half of those victims were able to recover all their data. A ransomware attack is now an official, reportable data breach according to the Department of Health and Human Services (HHS) and the Office of Civil Rights (OCR), where ePHI  (electronic personal health information) is impacted.

It seems that keeping sensitive patient health data secure is now as primary a concern as patient diagnosis and treatment. The heavily regulated medical industry has strict rules about when and how patient data should be encrypted, transmitted and decrypted. Telehealth applications must include data security standards and encrypted algorithms that are compliant with Federal laws and guidelines and see to it that any third-party platforms used are also completely secure and have total data protection, control over outside access, and overall continuity rules.

Integration and cost effectiveness

Your managed IT services company should be on top of any modern technology that would help your practice, and they will subsequently integrate anything new into your current network. Organizations with restricted environments will probably run into browser/plugin/network issues. Also likely are problems with the interface to historically used storage systems and/or devices. Devising workarounds could result in significant increases in infrastructure, maintenance, and upgrades–increasing total cost of ownership. Your IT managed service provider should discuss all this with you before you make any commitments.

“In some situations, it will be hard before it can ultimately be easy,” warns DKBInnovative’s CEO, Keith Barthold. “It’s all still highly specialized work, but a trusted managed IT provider should be able to keep your physicians and their support staff members’ pain to a minimum. Evolving medical technology is a given. Find a progressive and responsive managed service provider and let your information technology become your best friend.”

DKBinnovative is on the move!

Exciting things are happening at DKBinnovative, and we have important news to share!

As part of our commitment to deliver World Class Service to our customers, we have made significant investments in our people and infrastructure over the past few years. We are proud to announce that, due to our remarkable growth, we are relocating to new office space so we can continue to provide the best service possible.

Beginning 06/26/2017 we will be headquartered at our new office in Frisco. We could not be more thrilled about our new space. The new office offers more square footage, and more importantly it allows for a productive layout that will enhance collaboration, create synergy, and ultimately help us to provide the best customer experience possible.

Our new address is 1701 Legacy Dr., Suite 1450, Frisco TX 75034. Our phone number and dedicated service will remain the same.


DKBinnovative Accends List of 2017 World’s Top 501 Managed Services Providers (MSPs)

Exciting news to share!  MSPmentor 501 has named DKBinnovative in its List of World’s Top 501 Managed Service Providers for 2017.


The MSPmentor 501 ranking is the IT channel’s largest and most comprehensive list of leading Managed Service Provider (MSP) organizations worldwide.


The 2017 MSP 501 list and survey hinges on a revised methodology that assigns different weights to revenues by source. The methodology relies on an algorithm that evaluates company strength based on revenue contributions from various business activities.


The companies on the 2017 MSP 501 list reported a combined total of $14.52 billion in revenue (based on 2016 results), up 15% from the previous year. In an effort to encourage honest and robust participation, MSPmentor does not disclose specific annual revenue information (i.e., revenue dollars).


“With the accelerated pace of business, including security, cloud and revenue-enhancing strategies, DKBinnovative technology services drive customer productivity and competitiveness in today’s challenging marketplace.” said Keith Barthold, CEO, DKBinnovative.  “It is our mission to provide outstanding service that is personal and custom-tailored to each client’s specific needs.  We thank MSPmentor for this recognition.”


DKBinnovative Award-winning Growth
To achieve its worldwide leadership status in the MSP industry, DKBinnovative, has generated consistent double-digit growth since its founding in 2004. The company’s focus on IT services for healthcare, oil & gas and professional service firms mirrors a trend in the industry to concentrate on niche markets.

About DKBinnovative

DKBinnovative is a leading IT services company providing consultancy, technology and managed services. We successfully help companies reduce operational costs, improve efficiency and enhance control by enabling people, technology and applications to integrate more effectively. Our team of trained, certified IT experts deliver technology, security, cloud, mobile solutions, 24×7 outsourced network management, remote monitoring and support. Increasing client productivity, data security and profitability. Serving clients ranging from Healthcare to Oil & Gas and Professional Services firms.

DKBinnovative Accends List of 2017 World’s Top 501 Managed Services Providers (MSPs)

An Open Letter to Our Clients

Dear DKB Clients: Remember getting ransomware this weekend?

Of course you don’t because it never happened! DKBinnovative has your back.

This past Friday, malware known as WannaCry spread over 100 countries wreaking havoc for thousands of networks, namely shutting down much of the UK’s healthcare system. It was declared the largest ransomware infection to-date until stopped on Saturday by a ‘kill switch’ discovered in its code—however, new variants have already been reported making ‘round 2’ of the outbreak ready for attack. You can read a brief on what Ransomware is on our blog here, but concisely, it is a type of malware that encrypts data, requiring a payment to decrypt and unlock the data. The WannaCry or Wcry strain is particularly harmful because it spreads virally exploiting a known vulnerability in Microsoft Windows, unlike most ransomware which is caused by accidental download through website or email.

So why were you not impacted by this attack?
1) We patch your systems weekly so you already have the preventive patches in place for current, Microsoft-supported operating systems;
2) Webroot AV/Malware protection updates in real-time and we confirmed Friday that your systems were fully updated. More here on the protection provided by Webroot;
3) DKB uses Cisco OpenDNS ransomware protection as an added layer of protection to prevent ransomware downloads and execution;
4) Our team worked diligently all weekend to force patching all assets with the newest updates, even for Microsoft unsupported OS’s like XP and Server 2003. We did this to be extra sure our clients aren’t impacted.

Are you safe? Are there any other actions required?
Cybersecurity and the war against ransomware is a daily battle we are fighting on your behalf with a team of professionals backed by the best tools and processes to keep your systems safe and your teams productive. As updates or changes in defenses are required, DKB will respond accordingly just like we have for this threat. The steps taken above for wCry put our clients at very low risk for this particular ransomware but we need help with two items:

1) If prompted to reboot your machine because of patches applied, please do so without delay. Laptops that were powered down this weekend will receive forced patches on Monday morning and will request a reboot after applied.

2) Most security experts agree that the overwhelming majority of security breaches and infections are caused by human error with most infections spreading by email. While your company email is filtered for infections, malicious links and attachments do on occasion get through and there is little protection against personal email (Yahoo, Hotmail, etc.). When in doubt, delete. DKB is now deploying cybersecurity training that will be launched to all of our clients in coming months, so be on the lookout for this ongoing web-based training.

And lastly, Happy Mother’s day to all you mothers out there and the rest of us born to a mother (includes most of us). We’ve got your back like Mom has always had mine!

Keith Barthold
CEO | Fractional IT Officer – Productivity Enhancer – Profitability Accelerator
469.277.1961 (direct) | 1-888-DKBI-TECH (888-352-4832) |


Let’s face it, social media is part of every business today.  Healthcare providers using social media face thousands of dollars in HIPAA penalties and fees if there is a breach of protected information.  Do you have a clear policy and procedure for your team? Here are basic best practices to consider.


Create a policy document for the type of information that will be allowed for every social platform you use. 

Everything shared on the internet is eternal and every social media platform has their own privacy and usage policies for images uploaded to their systems. Whether you are sharing happy patient pictures and their stories of well being on your own website or on Twitter, Facebook etc, remember they can be downloaded and used by anyone on the internet. Be careful not to disclose any personal information on your clients that identify thieves could use to obtain additional information. Your policy and procedure should include having a form authorizing use of images and information for marketing purposes and the retention of the authorization reviewed by your legal counsel. Don’t forget to have your employees sign as well.


Protect social media access

Ensure your employees authorized to access and manage social media accounts are training on HIPAA policies.  If you have a third party manage social media, verify they understand the importance of HIPAA rules. Anyone with access to social media accounts should also follow best practices for login credentials and passwords to protect against unauthorized access.


Monitor your social media accounts and have an incident response plan

To limit the impact of unauthorized content that is not compliant with your social media policy you must monitor your account frequently.  Social media managers can mistakenly post a personal message on a business account instead of their personal one, or you could be hacked or have the wrong image uploaded. Mistakes happen as we are only human. Be sure you have an incident response plan for each social media platform that includes information and process on how to verify ownership of the account, remove content or disable the account when needed.  Make sure you have up-to-date contact information for management and social media manager(s).


Template policies and procedures

The Office of Civil Rights (OCR) fines providers for using sample policies that they do not follow. It may be necessary to create custom policies and procedures and document that your staff is complying with these policies.


Risk Mitigation and actions you can take

Conduct a full annual risk analysis that assesses systems and provides both HIPAA Security Compliance and Threat Analysis. Document compliance activities and implementation of policies. Utilize custom HIPAA security policies based on your organization and avoid generic templates. Breaches can happen often so stay on top of compliance all year around.

Hesitant to Use Apple Pay? It May Soon Be the New Debit Card | NBC 5 Dallas-Fort Worth

Apple Pay is simple to use and works with the devices you use every day. Easily pay with your debit cards and credit cards with just a touch. And because your card details are never shared by Apple when you use Apple Pay, making payments with your iPhone, Apple Watch, iPad, and Mac is the safer, more private way to pay.  So why have consumers been hesitant to use Apple Pay?

What will be the tipping point when credit cards finally disappear and mobile phone payments become your only form of payment? Take a few minutes and listen to CEO Keith Barthold share with NBC5 Dallas-Fort Worth about the benefits, concerns and potential of Apple Pay.

Spying On Cell Phones

High-tech surveillance tools that fit in a briefcase and mimic real cell phone towers to fool nearby mobile phones is one of the resources law enforcement, military and yes – hackers use. These devices called “Stingrays”  do everything from pick up calls and texts to jamming cell service or identifying the exact location of cell phones.  As long as your phone is on, you can be tracked.

Here is an interview CEO, Keith Barthhold, conducted with WHBC News Talk 1489 in Canton, Ohio.  Give it a quick listen. Let us know if you have concerns or questions on how to protect your information on mobile devices.