Selecting Your Next Healthcare IT Partner

In 2016, the top five reasons for outsourcing IT were enhanced security, proactive approach to technology, maximizing operations, access to newer technologies and cost savings. As a healthcare provider, finding a technology service provider with Healthcare experience is also vital for you.


Per Omnibus federal law, your technology provider must not only sign a Business Associate Agreement (BAA) but must have an in-house HIPAA compliance program similar to you the Covered Entity.  They should protect your PHI and maintain HIPAA, HITECH and HB300 compliance for your organization be bonded with an E&O, general liability, and cyber policy that covers ePHI data breach.

Not just any IT service provider will do. Here are questions to help you evaluate whether your current provider or outsourcing provider is the right prescription for you:


What customized support programs will be offered?

Is service customized based on your business requirements, not the “Silver, Gold, Platinum” one size fits all package.  You want the “right” package, not anything less than their very best.


How would they create a Disaster Recovery or Business Continuity plan for you? 

Disaster Recovery and Business Continuity Planning are a key part of technology management– they should be able to describe their process to identify your unique needs.


How will they keep you informed?

Do they send you automated reports or will they have someone meet with you on a regular basis? Do they have a well-planned process around identifying & communicating risks?


How will you and your provider measure success? Response time and absence of downtime should not be the only factors.  Is there quantified success criteria tied to productivity?


How is their team structured?

World class IT can’t have proactive and reactive support people in the same roles.  A firefighter that practices prevention will always be consumed with putting out fires. Your provider should be staffed with 50-80% proactive roles dedicated to preventing problems.


What is their process to ensure your network is compliant with industry accepted best practices.

This should be a documented process that is completed on a regular basis, not just a reactive series of site visits.


How frequently will an inventory of technology assets be reviewed, updated, and what is the process to maintain documentation?

It’s important that they can articulate processes and systems built around capturing and maintaining documentation. Is it always current and readily available? Is there a repeatable process in place to manage risks?


Choosing a provider with strong business acumen is key to security, operations, savings and ability to resource new technologies. Choosing a technology partner that understands your business is a vital prescription to success.


At DKBInnovative, we love what we do. We would be happy to visit with you to learn more about your business and help evaluate if outsourcing is beneficial for you. Call us at (469) 828-2468.

Why You Need Identity Management and Governance

This New Year we have been inundated with warnings from experts and journalists that 2017 will bring an increase of DDoS, IoT and Ransomware attacks that will far exceed 2016’s record.  A New York Times report last year noted 83 million JP Morgan Chase customers had their credentials stolen when hackers were able to steal information after obtaining the credentials of a JP Morgan employee with privileged access to servers containing customer data. The scale of these attacks is monumental if the stolen identity data is used to fuel future privacy invasions.


To mitigate risk companies need identity and access management. It must become an integral part of every company, big and small alike. A strong rules platform will increase employee productivity while improving security. Identity Management is an essential part of ensuring that employees are both empowered to deliver value and prevented from damaging the business’s reputation, security, or bottom line. Check out these top 10 reasons to ensure identity and governance:


Top 10 Identity and Governance Objectives

  1. Improve decision making and business goals
  2. Automate and streamline processes
  3. Standardize
  4. Reduce cost
  5. Identify and mitigate risk
  6. Increase enterprise value
  7. Meet internal and external requirements
  8. Empower management and staff
  9. Ensure Security, Privacy and Compliance
  10. Maintain identity data integrity


The growth of cloud computing and a mobile workforce can make management very complex. Pressure is on for information quickly. The desires for on-demand access are real security issues that keep IT managers up at night. Facing attacks on critical applications both inside and outside, companies must make sure that access is tightly regulated and controlled.


“Quite often we see silos exist with each department customizing access to best suit their departmental business goals. The corporate IT requirements have gone unenforced and they end up with a puzzle of patchwork that leads to lost productivity, and potential security breaches.”  Keith Barthold, CEO DKBInnovative


Challenges and Solutions 

Remote workforces, distributed applications, Bring Your Own Devices (BYOD), password problems and regulatory compliance are all concerns. Without a seamless way to access applications, users struggle with password management and IT is faced with rising support costs from frustrated users.


One solution is to implement a holistic Identity Automated Management solution to help administrators consolidate, control, and simplify access privileges, whether the critical applications are hosted in traditional data centers, private clouds, public clouds, or a hybrid combination of all these spaces.


Without a centralized system, staff must provision access manually. The longer it takes for a user to gain access, the less productive that user will be. On the flip side, failing to revoke the access rights of employees who have left the company or transferred to a different department can have serious security consequences. Manual provisioning and de-provisioning access is labor-intensive and prone to human error. Mistakes can be costly and for large companies, it is not a sustainable way to manage user identities and access.


Bring your own device (BYOD)—there really is no choice in today’s times. Employees, contractors, partners, and guest are bringing in personal devices and connecting to the corporate network for professional and personal reasons. The challenge with BYOD is whether companies can react quickly enough to protect business assets—without disrupting employee productivity and while offering freedom of choice. Almost every company has some sort of BYOD policy that allows users to access secure resources from their own devices. Accessing internal and SaaS applications on a mobile device can be more difficult than from a networked laptop or desktop workstation.


Technology shifts such as the Internet of Things requires deploying solutions that scale to meet the large demand of devices looking to tax the corporate network. Companies must develop a strategy that makes it quick, easy, and secure to grant—or revoke—access based on corporate guidelines and regulatory compliance.


Sarbanes-Oxley regulations is another key driver for corporate governance with much of the onus to provide data falling on the IT department. Ensuring processes such as access privileges, tracking management approvals for expanded access, and documenting who has accessed what data and when can go a long way to easing the burden of compliance and ensuring a smooth audit process.


In conclusion, the benefits of deploying identity management and governance solutions are clear. Cost and complexity can impact even the most well-intentioned organization, however, when you consider the cost of a potential security breach or the inefficiencies to manual provisioning and de-provisioning of access, the decision is quite clear.


DKBInnovative assist companies with defining and effectively communicating why identity governance is critical for the organization. We understand governance benefits and can see the big picture as well as the evolving identity risk landscape. We help implement an identity governance framework which helps meet our client’s established objectives. 

Call us at (469) 828-2468 to learn more about DKBInnovative, our processes and procedures for mitigating risk while enabling our client’s technology to support and enable growth.


How hackers can steal your identity when using public WiFi

The Internet is an increasingly hostile environment.  DKBInnovative’s extensive background both as an integrator and consumer of wireless technology makes it possible to offer expert consulting support for a broad range of wireless applications. Our expert “ethical” hacker Randy Haba recently partnered with NBC 5 Responds to show just how easy a Hacker can steal your identity when using public WiFi.  Whether on your laptop, smart phone or tablet, be smart. Here are a few safety tips to keep in mind:

  • When a free WiFi connections is requesting account information for access, like facebook or credit card info, this should be a red flag. It could be a fake, man-in-the-middle type attack like we demonstrated on your news clip with NBC 5. Don’t enter that account info!


  • Use free WiFi alternatives, like tethering to a phone.


  • Use different passwords for your accounts – social media, email, amazon, bank, and credit card logins should all have different passwords so a single compromised password doesn’t result in major identity theft or worse.


  • Don’t use public WiFi to view or transmit any sensitive information (ie. checking bank and credit card statements, and shopping online should be avoided).


  • If you do need to purchase WiFi (like on a plane) use a credit card instead of a debit card. In the case of credit card theft, it’s better to untangle fraudulent credit charges than dealing with an empty bank account and bill due.

Please share with your family, friends and colleagues. If you need help creating a wireless security strategy that fits within the security plan for your entire business, please Contact DKBInnovative at (469) 828-2468.



Life happens. Do you have a Disaster Recovery Plan?


 bartlett-fam img_4053 p-gainesville-pd-house-fire_1481684766406_2438948_ver1-0_640_360

Please offer your prayers for Officer Keith D. Bartlett, Lorretta Bartlett, and their five children. Their home in Era, TX caught fire the evening of 12/12/16 and was completely lost.  Contents–including Christmas gifts, clothes, appliances, furniture, and sadly their dog Chico—are gone.

Have you set up a Disaster Recovery Plan for your business? Life happens. This week I was sadly reminded of the importance of having a plan. In the blink of an eye tragedy can strike and everything can be lost. It’s easy to put these plans in place for our clients. They love the peace of mind. But I know for every company that is properly prepared, there are another 10 who aren’t. Family plans are equally important.

Last week the Bartlett Family of North Texas lost their home in a devastating fire. While my heart sank, knowing this family has 5 kids and a long journey ahead, I knew my team at DKBInnovative could help in this crisis. I immediately set up a GoFundMe account to rally support, and within 48 hours we had raised over $34,000 online, not to mention donations collected by the church and police department working together. 

Residential fires are devastating both literally and emotionally. Greater than the loss of shelter and safety are the irreplaceable items that represent your family memories, like photo albums, furniture, art, books and documents. Our team of experts is working to salvage as many documents and photos as possible from the family’s damaged hard drive. We are blessed to be able to do what we can to take a little burden from Officer Bartlett’s family in their time of need this holiday season. 

As a business owner I believe giving is good for our community, our employees and our hearts. We care. We work hard to be great business neighbors and to provide great service for our clients, and every now and then, to a great family like the Bartletts. If you too would like to contribute to the Bartlett family, please donate here.

The American Red Cross has a great checklist for picking up the pieces after a fire. Click here to download your own copy. Taking time to plan for disaster should be on your security checklist. If your business needs a disaster recovery plan, our team at DKB is ready to help.

Is your company doing something to make a difference this December? We would love to hear your stories.


RANSOMWARE: Are You Protected? (as published in Dallas Medical Journal, Nov. 2016

You’ve been thinking that your private practice won’t get hacked? Or that your small, rural hospital is totally under the global cyber crimes radar? That there’s not enough monetary value in your database to interest cyber thieves? You’re just wrong. Private Health Information (PHI) is coveted for identify theft and fraudulent payor claims, plus it’s highly regulated and mission critical— a digital goldmine for the army of cybercriminal extortionists operating outside U.S. borders.

The Department of Homeland Security reported in July that there has been an average of 4,000 ransomware attacks per day since January 1, 2016. In the first half of the year, there were four Adobe Flash and Microsoft Silverlight software bugs that, if not patched, opened the door for invasion. For example, a health worker using an EHR Googles the patient’s health condition—and gets ransomware. Keeping up with patching software bugs is just one of the many facets of warding off hack attacks and this battle does not appear to be slowing down: ransomware alone will exceed $1 billion in damages this year.

In fact, the healthcare industry had the highest number of all data breaches reported, suffering 39 percent of all breaches that occurred in 2015, according to Mountain View, Calif.-based cyber security firm Symantec’s 2016 Internet Security Breach Report. In Reston, VA, more than 13,000 patient records were hacked, and the data was encrypted pending payment from this one-doctor dermatology practice. All patients had to be notified that their personal information had been breached. Similarly, the small 86-bed King’s Daughters’ Health hospital in Indiana discovered that a single email infected by the Locky ransomware virus crawled into a server and started encrypting data. KDH immediately powered down its computer systems to protect the remaining data, and faced significant downtime and careful PR navigation as a result. In both cases, healthcare businesses were the losers.

Healthcare organizations, along with small businesses and schools, make good targets for ransomware attacks because they don’t usually have the sophisticated backup systems and other resilience measures that are typical at large corporations. They often begin with an e-mail attachment opened by an unwitting employee. The e-mail launches malicious code that crawls through the victim’s computer system, encrypting and locking up data folders and the computer’s operating system. The cyber criminals demand payment in return for providing the decryption key. Attacks like these often don’t make headlines because the victims understandably don’t want to talk about it, whether they pay or they don’t pay.

“Ransomware attacks are crimes of opportunity,” points out Keith Barthold, CEO of DKBInnovative, an IT management company headquartered in Dallas, TX. “Medical practices in particular are low-hanging fruit for cyber criminals because patient files contain easily sold information such as social security numbers or Medicare particulars.  And attackers know that extortion works when the alternative to paying is often downtime, data loss, bad publicity, and steep HIPAA compliance fines.  The best way to protect the data medical business of any size is prevention.”

“Your level of exposure to potential ransomware can be identified”, says Barthold. “You need to have a professional team who understands healthcare security perform a security risk audit. Risk mitigation to ensure the privacy of your patient information can then be implemented pretty quickly. But you must also realize,” he added, “that technology can change almost hourly these days. What protects your data this week could be obsolete in two weeks. Preventing cyber crime has become a highly specialized endeavor. IT management must stay on the leading edge of security best practices and the solutions available to best keep systems protected. It’s a complicated dance between the good guys and the bad guys. You have to have true passion and absolute devotion to your healthcare clients to keep them protected.”

Contact DKBInnovative at or by phone at (469) 828-2468 for a free list of ransomware prevention tips.


DKBInnovative Is One Of The 20 Most Promising IT Productivity Solutions Providers 2016 Named By CIOReview

The prestigious IT industry print magazine, CIOReview, recently listed DKBInnovative, a Dallas-based IT managed services company, in their top 20 Productivity Solutions Providers of 2016. Companies in the list have exhibited in-depth expertise in engineering best-in-class productivity tools.

 Dallas, TX (PRWeb), November 1, 2016—DKBInnovative, a Dallas-based IT managed services company, was recently named as one of the “20 Most Promising Productivity Solutions Providers 2016” in the IT industry magazine CIOReview. CIOReview sees its mission in IT as being ‘The Navigator for Enterprise Solutions.’ “I congratulate DKBInnovative for its achievement in providing secure and highly reliable managed IT solutions for business,” said Jeevan George, Managing Editor of CIOReview. They have consistently provided comprehensive IT strategies that can boost levels of productivity and thus accelerate business objectives. We look for those IT companies who are positively impacting the marketplace.” (See the complete list here.)

DKBInnovative began while its founder and CEO, Keith Barthold, was still advancing and enjoying his 10+ year career at Perot Systems/Dell Services. “IT managed services got real big, real fast,” said Barthold. “From the very beginning of our company we determined that, for us, service and solutions would mean the same thing. Because of the exploding pace of today’s technology, we started by not just thinking outside the box, but also ahead of the box.” Currently DKBInnovative has offices in Dallas and Frisco, Texas. Although their focus is regional, DKB also does work nationally and internationally on behalf of their larger clients.

DKBInnovative offers with its state-or-the-art best practices for outsourced IT managed services the expertise of a virtual Chief Information Officer, or VCIO. The VCIO will participate in the planning, budgeting and implementation for all IT assets in a client’s business—a process that will transform IT for the company users, resulting in greater security and productivity. This has worked well for over 200 medical practices and hospitals, and for dozens of energy, technology, and professional services firms. “Our clients rely on technology as a competitive advantage and business enabler,” states Keith Barthold, “and no one can afford to be interrupted or have their data compromised. You have to think ahead, plan ahead, and be ready for whatever the world throws at you. Forward-thinking IT management is both your winning game plan and your depth on the bench, your most cost effective way to mitigate these company-killing risks. DKB is in this game to win it.”

CIOReview helps organizations find the best-of-breed productivity tools. Their listing of the 20 Most Promising Productivity Solution Providers 2016 provides a look into how these solutions work in the real world and how they shape up against the competition.

See the entire press release here.

Dallas ISD Taps DKBInnovative, Local IT Management and Support Company, For Technology Trends Update

Dallas-based IT management and support company DKBInnovative was asked to present an update on technology trends and threats in a professional development seminar sponsored by the National Academy Foundation, specifically for members of the NAF Information Technology departments in the Dallas Independent School District.

Dallas, TX (PRWeb) October 18, 2016—DKBInnovative CEO Keith Barthold gave his first presentation to the combined National Academy Foundation IT departments from the Dallas Independent School District last week. DKBInnovative is a Dallas-based IT management and support company that specializes in the information technology challenges for healthcare, energy, and professional services industries. “I was thrilled to have the opportunity to present to and interact with the NAF faculty. Technology evolves daily, and we are going to need so many more of those unique students who love to keep constantly learning to stay at the forefront of IT,” said Barthold.

Founded in 1982, the NAF is a non-profit organization whose mission is to partner with existing school systems to implement small learning communities within traditional high schools. Their “academies” focus on STEM infused industry-specific curricula that includes finance, hospitality/tourism, information technology, engineering and health sciences.  “The NAF’s work-based learning strategy affects the growing gap between supply and demand in the technology workforce,” Keith Barthold pointed out. “Cyber security, system networking and the explosion of mobile technology have become integral parts of our everyday lives now. Having a program in the schools that offers non-traditional learners an opportunity to excel in their strengths is already a factor in enhancing and protecting our businesses and our communities.”

Barthold gave his recommendations to the NAF teachers based on his years of being in the trenches with clients, as technology has evolved into being the key to overall productivity. He advised teachers to include an emphasis on soft skills like communication and emotional intelligence, practicing teamwork, learning the value of documentation, and being taught how to troubleshoot, problem-solve, and find and follow the logic of any situation. “Learning how to set, progress with and achieve goals has been huge in the success of DKBInnovative,” noted Barthold. “The goal itself is not the grade. Learning the discipline of how to track progress and how to keep following through is the lesson.”

The NAF reports that some 89,000 students across 36 states have attended their academies, with 98% of their seniors graduating and 92% of graduates going to college. For more information on the NAF, go, and to learn more about DKBInnovative please visit

About DKBInnovative

DKBInnovative is comprised of dedicated, passionate, and hard-working IT professionals committed to providing best-in-class IT services. Having served 60+ hospitals and hundreds of medical practices, plus dozens of energy and professional services firms, they partner with clients to navigate any and all IT needs including security, network, vendor selection and management, and comprehensive security including HIPAA compliance—with a focus on increased workforce productivity.  Contact DKBInnovative at or by phone at (469) 828-2468 for more information.

See the press release on PRWeb at


How to really stink at security — the 10 DON’Ts of IT security

Maintaining a secure IT network is paramount for any business — especially in a day and age of sophisticated viruses, rogueware, spyware and the many other threats that can compromise the heart of your company.

Unfortunately, many businesses and their employees are simply too busy and tied up with their normal duties of the day that they don’t think much about what they can do to bolster the security of their business’ network. Failing to take the proper precautions can result in a disastrous event that could compromise sensitive data or cause you to lose it completely.


Network security — What NOT to do

You don’t have to be an IT mastermind in order to take steps that will help make your company’s network more secure from the many threats it faces. Still, whether out of ignorance or laziness, these very simple things generally don’t get done.

There are some businesses and professionals out there that are simply bad at network and internet security. The following is a top 10 list of practices you should most definitely avoid. Or, if you want to be really bad at security, by all means, proceed.


  1. Generic passwords or no passwords

Let’s start out with one of the most common missteps. Leaving passwords as “password” or keeping them blank completely makes it very easy for unintended eyes to access the sensitive data of a business.

  1. Lack of, or no, training

Employees aren’t going to magically know what they should, and should not, be doing to promote IT security. It’s important to rally the staff together and at least go over the basics of IT security.

  1. Failing to update important software

Virus scanners, spyware scanners — these are only effective if they are kept up-to-date. Updates allow the software to constantly fortify any weak areas that compromise its effectiveness.

  1. Reckless internet browsing

Clicking on a corrupted web ad or website can be enough to invite some truly invasive and destructive stuff into a network. Employees all over the network must surf with caution.

  1. Failing to backup information

It’s simply a matter of doing business the right way — all information must be backed up and stored at an offsite location so that, in the event of a disastrous scenario, the data has a better chance of being fully recovered.

  1. Trying to do high-level IT work yourself

Look, we realize that small business owners want to save money, but when IT solutions are not implemented correctly, it’s going to cost a lot more money in the long run if something compromises the network. It’s important to work with competent IT professionals to set up a secure business network.

  1. Relying on out-of-the-box solutions

Consumer-grade products work well enough, but businesses need more stringent security measures. The only way to achieve that is by working with IT professionals that can implement solutions that fit the specific needs of your business.

  1. Failing to test DR plans

It’s important to be prepared for the worst, which is why disaster recovery planning is essential for any business. However, a plan can quickly become obsolete, which is why it must be consistently tested to ensure it remains effective.

  1. Not having a security policy

Or, a business might have a security policy but it is rarely enforced. Businesses need to put a pen to paper on what is expected from employees to promote security and then follow up by enforcing it.

  1. Not recognizing the in-house threat

Talk to many IT professionals, and they will tell you that a business’ own staff serves as the biggest security threat. Now, we’re not trying to make you paranoid about your employees, but it is wise to have safeguards in place to monitor activities and avoid wrongdoing.


If you find yourself guilty of some — or most of these — it doesn’t mean you’re a bad business owner or employee. This simply means that you need to get tougher about security in order to protect your business.

DKBInnovative works with all types of small and medium-sized businesses to help them maintain secure, efficient networks. Talk to our team and see what we can offer your business.


Stay safe out there!


KB Signature v2

Ransomware – How to prevent being a hostage to your system

As time passes and technology evolves, viruses and rogueware continue to advance and become more sophisticated. “Scareware” and “ransomware” are two terms that are coming up more and more in offices across the United States.

These are two forms of rogueware that have actually turned into an industry worth over $100 million dollars for the con artists that are behind them. You might be familiar with these tactics — maybe you encountered them and didn’t even know they had a name.

Scareware consists of prompts that appear on your computer, claiming that it has been infected with a certain virus and that the user must call a phone number or submit money online to have it fixed. In reality, there is no virus, but the person on the other end of the phone will gladly take your money to “fix” the problem.

This tactic in and of itself is completely unethical, but nefarious internet users all over the world have upped the ante with additional forms of ransomware.


What is ransomware?

Scareware is a more toned down version of ransomware — it’s generally easy to get passed. In some cases, you can just ignore the bogus virus alerts and go on your merry way.

However, ransomware can include some really damaging and disruptive stuff. The following are a few cases.

  • Ransomware can lock up your screen or computer, presenting the user with another bogus prompt about how they either have a virus or it might go so far as to say their computer is in violation of some federal law.
  • Even more invasive, some ransomware can invade your computer and encrypt personal files. As the user, you will not be able to access your own files unless you send payment.
  • Oh, but these online criminals can stoop even lower. In some cases of ransomware, pornographic images or advertisements are embedded on a computer and will only be removed if a payment is submitted.

Almost needless to say, when this form of rogueware strikes a business, it can mean some really bad news. And, that’s what’s happening. Rogueware is considered a growth industry and more and more businesses are faced with it each year.

Ransomware and your business network
Introducing ransomware onto a work computer is as easy as being tricked into clicking on an infected web ad or visiting a certain website. Ransomware can take its toll on a business network in a number of ways.

  • Money spent on ransom
  • Sensitive information may become compromised
  • Network downtime
  • Data loss
  • And more

Many businesses opt to simply pay the ransom to save their companies hours, days or weeks of downtime. They also fear that the sensitive information of their company is at risk.


Protect your business from ransomware

Businesses can mitigate the risk of a ransomware attack by taking a variety of measures. Some of these include:

  • Practicing caution when using the internet
  • Implementing anti-virus software and a firewall
  • Having a data backup and disaster recovery plan in place
  • Contacting authorities (this is very much a crime)


DKBInnovative works hard to bring security to the businesses that we work with. Our team offers managed IT services that help avoid ransomware and the multitude of other threats on the internet.

Don’t let ransomware plague your business network. Contact DKBInnovative to see if your network is safe.


Stay safe out there!


KB Signature v2

Disaster recovery — Protection against data loss

Picture, for a moment, that your business is hit by a catastrophic incident. Maybe a fire has destroyed your office or your company’s network has been attacked full force by hackers, thus, decimating your system.

How would your business respond? Would it scramble to find the necessary help and resources to recover the lost information? Would there even be any hope that the lost information could be recovered?

The unfortunate reality is that many businesses do face events like this, and they are caught standing flat footed in terms of their data backup and disaster recovery planning. It’s easy to get a plan in place — businesses simply need to find the right partners and be proactive about it.


Why is disaster recovery important?

The impact of a disastrous scenario can be profound. In fact, many businesses are unable to fully recover in scenarios like this, which can eventually drive them out of business.

A disastrous IT event can take its toll in a number of ways:

  • Financial costs: These can range from hiring professionals to sift through the wreckage of your network or fines levied for not properly protecting important client information. Without continuity, businesses also lose days, weeks or even months of productivity.
  • Credibility: A major incident of data loss can be a significant blow to a company’s credibility — clients and partners may take notice.
  • Fate of the business: If the scenario is severe enough, these types of situations can prove impossible to completely bounce back from, thus, costing business owners the companies they worked so hard to build.


These extreme scenarios might seem incredibly rare. After all, the chances are not significantly high that your building will start on fire or your office will be directly in the path of a tornado, however, it doesn’t have to be something this major to take a toll on businesses.

Accidentally downloading corrupted files, hardware failure, human error — businesses face many different hazards that can lead to significant data loss. These are things that all businesses are susceptible to.


Key approaches to any disaster recovery plan

Many businesses don’t think about their disaster recovery plan until it is too late. The most frustrating part about this is that, with a little foresight and thought, any business can be ready for such scenarios.

When a company is designing a disaster recovery program it’s important to take the following approaches:

  • Preventative: Anticipate the potential threats to your network and take measures to mitigate those risks. Always avoid an incident if possible — that should be a no-brainer.
  • Detective: A DR plan should include measures that help expose disastrous events in their infancy so measures can be taken swiftly. An example of this is installing anti-virus software so you can know right away if your network is under attack.
  • Corrective: Then, of course, a DR plan should have steps in place to restore the compromised elements of your network so that your business can maintain continuity.


An important piece of DR planning is teaming with the right group of professionals. DKBInnovative has decades of combined experience on staff with technicians that are trained and knowledgeable in creating sound DR plans.

The DKBInnovative team invites all interested businesses to tap into this knowledge and ensure that productivity continues rolling even in the face of a disastrous scenario.

Stay safe out there!


KB Signature v2