“Empowering Small Medium Business in the Digital Era”

Cybersecurity Assessment
95% of security breaches are made by human error.

Can your team spot the red flags in a phishing email?


The fraudulent practice of sending emails pretending to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Social Engineering

Is the art of manipulating people so they give up confidential information. When individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

Passwords best practices

Never reveal your passwords to others

Use different passwords for different accounts and websites

Use Two-factor authentication

Use Length & complexity

Make passwords that are hard to guess but easy to remember

Use a password manager

Don’t write passwords in stickies

Cybersecurity Best Practices



  • Physical security, access and locks to IT communication equipment (MDF and IDF)
  • Proper Firewall equipment and configurations
  • Content Filters and Traffic Shaping rules
  • Access Points (WIFI) with proper configuration and passphrase, avoid open WiFi
  • Backups
  • Guest WiFi for external users
  • User CyberSecurity Training
  • DNS (Umbrella) & SPAM (CPL) Protection is a plus
  • EDR (endpoint detection and response)
  • Windows firewall (OS)
  • Operating system security software
  • VPN client, recommended when not using a trusted network eg. traveling
  • Backups
  • DNS client is a plus
  • 2 factor Authentication is a plus
ThreatDown Malwarebytes

We are here to help your business with our Cybersecurity trainings, recommendations and assessment of your business operations. Remember: 

 IT support is not just an option if you want your business to run smoothly, it's a necessity.

Interested, 15% off in your Cyber Security Assessment if you reach via this form!

(C) Dowhilesys - 2024

This website makes use of cookies. Please see our privacy policy for details. Accepting the use of cookies you agree to our Terms of use and privacy policy.