{"id":322,"date":"2024-05-07T11:15:41","date_gmt":"2024-05-07T16:15:41","guid":{"rendered":"https:\/\/www.dtktc.com\/?page_id=322"},"modified":"2024-05-07T14:15:14","modified_gmt":"2024-05-07T19:15:14","slug":"end-point-detection-and-response","status":"publish","type":"page","link":"https:\/\/www.dtktc.com\/index.php\/end-point-detection-and-response\/","title":{"rendered":"End Point Detection and Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"322\" class=\"elementor elementor-322\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec89df3 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec89df3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5fd57f\" data-id=\"c5fd57f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbaf091 elementor-widget elementor-widget-spacer\" data-id=\"cbaf091\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e058739 elementor-widget elementor-widget-heading\" data-id=\"e058739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End Point Detection and Response (EDR)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba356d5 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba356d5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4948bcf elementor-hidden-mobile elementor-hidden-tablet\" data-id=\"4948bcf\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd7c789 elementor-widget elementor-widget-menu-anchor\" data-id=\"bd7c789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"graphicdesign\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abf492b elementor-invisible elementor-widget elementor-widget-image\" data-id=\"abf492b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:0}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"625\" height=\"416\" src=\"https:\/\/www.dtktc.com\/wp-content\/uploads\/2024\/05\/Picture1.png\" class=\"attachment-full size-full wp-image-324\" alt=\"\" srcset=\"https:\/\/www.dtktc.com\/wp-content\/uploads\/2024\/05\/Picture1.png 625w, https:\/\/www.dtktc.com\/wp-content\/uploads\/2024\/05\/Picture1-300x200.png 300w, https:\/\/www.dtktc.com\/wp-content\/uploads\/2024\/05\/Picture1-600x399.png 600w, https:\/\/www.dtktc.com\/wp-content\/uploads\/2024\/05\/Picture1-64x43.png 64w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07351c2 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"07351c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.dtktc.com\/wp-content\/uploads\/elementor\/thumbs\/Screen-Shot-2022-08-24-at-10.43.30-AM-qntglwemzxrtoltxqin24ywonrk2f4h4llzwvopfv6.png\" title=\"Screen-Shot-2022-08-24-at-10.43.30-AM.png\" alt=\"Screen-Shot-2022-08-24-at-10.43.30-AM.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b31958 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"6b31958\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:1500}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.dtktc.com\/wp-content\/uploads\/elementor\/thumbs\/Screen-Shot-2022-08-24-at-10.39.03-AM-qntglyabdluebtr7fjgb9yflujasuiol9vavu8mn9k.png\" title=\"Screen-Shot-2022-08-24-at-10.39.03-AM.png\" alt=\"Screen-Shot-2022-08-24-at-10.39.03-AM.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61c2d01 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"61c2d01\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:2000}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.dtktc.com\/wp-content\/uploads\/elementor\/thumbs\/Picture2-qntgm05zr9wyz1oh4k9kexyj1b1j9ww1y4lussjus4.png\" title=\"Picture2.png\" alt=\"Picture2.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a8db854\" data-id=\"a8db854\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40b8151 elementor-widget elementor-widget-text-editor\" data-id=\"40b8151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner vc_custom_1535153380671\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element vc_custom_1548946708888\"><div class=\"wpb_wrapper\"><h3><strong>New Hackers, big threats<\/strong><\/h3><p><br \/>Security used to be a lot simpler; the biggest threats were phishing attacks, worms, trojan horses, DDoS attacks and out-of-date software, it was much easier to avoid cyber-attacks than it is now.<\/p><p>New threats bypass traditional antivirus solutions, making them \u201csilent killers.\u201d These include spear phishing, zero-day attacks, file-less threats, ransomware and software and data changes, it has become scary and important, and the largest percentage of attacks are on small businesses.\u00a0<\/p><p>Most small business owners don&#8217;t believe they are at risk, but contrary to this is the fact that small businesses are less protected. Think about the data you hold.<\/p><h3><b>61% of SMBs faced a cyberattack of one severity or another last year<\/b><\/h3><h3><b>Why?<\/b><\/h3><p><br \/>They are typically less-sophisticated (= less protected) when it comes to\u00a0 cyber-security<\/p><p>They are often targeted because they are providers to larger companies.<\/p><h3><b>Most companies take an average of 191 days to detect a breach. Can you afford to be down for hours? days? or weeks?\u00a0<\/b><\/h3><h3><b>SMB cleanup costs are high!<\/b><\/h3><ul><li>1 in 4 pay &lt;$100k to resolve<\/li><li>1 in 5 pay $1mm to $2.5mm to resolve<\/li><\/ul><\/div><p>Here\u2019s Where a Managed Service Provider Comes in. We can:<\/p><h3><strong>1. Collaboratively assess your current security risk<\/strong><\/h3><p>If you haven\u2019t done a security assessment in the last 12 months, you\u2019re overdue!<\/p><p>Scan your network for varying kinds of threats:<\/p><ul><li>Sensitive data<\/li><li>Vulnerabilities<\/li><li>Inappropriate access permissions<\/li><\/ul><h3><strong>2. Create and implement a cybersecurity plan<\/strong><\/h3><p>Cyber-security planning has become part of running a business<\/p><p>\u201cLayered security\u201d, or \u201cdefense in depth\u201d refers to the idea that cybersecurity requires multiple lines or layers of defenses to protect against threats.<\/p><p style=\"text-align: center;\"><a href=\"https:\/\/www.bluerayconcepts.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-24-at-10.49.53-AM-1.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-17520\" src=\"https:\/\/www.bluerayconcepts.com\/wp-content\/uploads\/2022\/08\/Screen-Shot-2022-08-24-at-10.49.53-AM-1-300x288.png\" alt=\"\" width=\"400\" height=\"384\" \/><\/a><\/p><h3><strong>3. Proactively manage your IT systems<br \/><\/strong><\/h3><ul><li>Monitor firewall activity, hack\/spam relay attempts<\/li><li>Monitor backup status, whether on-site or remote<\/li><li>Monitor patch updates<\/li><li>And more\u2026<\/li><\/ul><p><strong>\u00a0<\/strong><\/p><h3><strong>4. Relax; your MSP will keep your business security and security systems up-to-date!<\/strong><\/h3><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>End Point Detection and Response (EDR) New Hackers, big threats Security used to be a lot simpler; the biggest threats were phishing attacks, worms, trojan horses, DDoS attacks and out-of-date software, it was much easier to avoid cyber-attacks than it is now. New threats bypass traditional antivirus solutions, making them \u201csilent killers.\u201d These include spear&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-322","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/pages\/322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":31,"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/pages\/322\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/pages\/322\/revisions\/420"}],"wp:attachment":[{"href":"https:\/\/www.dtktc.com\/index.php\/wp-json\/wp\/v2\/media?parent=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}