Phishing and Spam Defense

Did you know that 91% of cyberattacks start with a phishing e-mail?

Phishing works by sending emails laced with ransomware, fileless malware, and other threats directly to your employees. These emails are disguised as messages from trusted individuals like a manager, coworker, or business associate to trick your employees into activating the enclosed malware or granting unauthorized access. The results include Business Email Compromise (BEC), Account Takeover (ATO), credential theft, ransomware and more disastrous incidents.

As these attacks grow more sophisticated, not even Google Workspace or Microsoft 365 can filter them out, but our AI can.

Our AI works within Microsoft 365 and Google Workspace to detect and block malicious e-mail messages before you or your employees can interact with them. It also learns from your employees by letting them block unwanted e-mail messages with one click and tailors spam protection based on their preferences.

Combined with our Security Awareness Training, Phishing and Spam Defense provides the best protection from these threats to your business, infrastructure and data.

To find out more, check out our Phishing and Spam Defense page or contact us!

Security Awareness Training

Are you and your employees trained to deal with the ever-evolving threats to your business posed by social engineering?

Digital Age Solution offers Security Awareness Training that is affordable, effective, and meets your Cyber Insurance Requirements.

Untrained employees are security hazards, but training turns them into assets.

Our quick video lessons, quizzes, and phishing simulations provide you and your employees with the knowledge and skills to avoid ransomware, phishing attacks, and data breaches.

Each month, you get a report of progress and potential areas for improvement. It’s automated, easy, and fast!

Learn more about this service at our Security & Awareness Training page, or contact us for more information.

Thank You Frederick!

Thanks to all of you for voting Digital Age Solution one of the Top Three Finalists in the Frederick News Post’s Best of the Best!

License Plate Recognition with Verkada

Digital Age Solution’s Verkada Security Camera offering now includes License Plate Recognition (LPR).

This innovative solution goes beyond being able to see a license plate on your security camera footage. LPR reads the license plates and keeps a database of license plates that have been recorded. So, you can view a list of license plates that entered your property.

Taking it one step beyond that, LPR allows customers to search for a specific or even a partial license plate and see every time that vehicle was seen entering and exiting the property or area under surveillance.

LPR joins the standard Actionable Data Insights available through Verkada’s Command Console. The other Actionable Data Insights include:

  • People Search
    • Search for individuals using clothing color and appearance
    • Access all footage of detected individuals across cameras
    • Upload image of individual to find all relevant footage
  • Vehicle Search
    • Find vehicle(s) of interest using color, body type, or make
  • Motion Plotting
    • See real-time activity across your Floor Plans
    • Track motion occurring throughout your site with live heat maps
    • Respond quickly to incidents with insights into where activity is happening
  • Smart Object Counting
    • Identify the number of people or vehicles in frame
    • Bounding boxes quickly highlight person or vehicle
    • Number indicators appear as users scroll over footage
    • Receive alerts if the number of people in an area exceeds a given number
  • Heat Maps
    • Create on-demand visualizations of space utilization
    • Plot movement of people and vehicles
    • Evaluate high-traffic areas across different time periods

Introducing Call Move

Digital Age Solution continue to build upon our services to provide our customers with new and innovative ways to stay in communication wherever you’re working.

We’ve added and expanded the UC Platform that turns your web browser into a desk phone, video meeting platform, voicemail, and messaging client.

Our mobile app continues to gain in popularity, because it turns your smartphone into your work phone to make, receive, and manage calls without exposing your private cell phone number.

Our SMS product allows you to send and receive text messages from your work phone number using UC and soon from your mobile device.

This week, DAS added Call Move to the functionality of all three platforms (desk phone, UC, and mobile app).

Call Move allows you to move any current voice call to one of the other platforms. So, if you’re on a call on your desk phone and need to get up and move, you can “MOVE” the call to your mobile phone.

  • If a user is on their desk phone they can move the call to mobile by pressing *99 and move to UC by pressing *98
  • If a user is on UC they can move to desk phone or mobile by selecting the desired “move to” destination located under the Transfer button menu
  • If a user is on Mobile they can move to desk phone or UC by selecting the desired “move to” destination located under the Transfer button menu

If you need assistance with any of these features or don’t know if you’re set-up to use these, give us a call. We’ll arrange to get you set-up with these functions.

If you are not already a DAS VOIP Customer, call or chat with us from this web page to find out how we can help you with our Cloud-based Voice Over IP and Unified Communications Products!

Vote Digital Age Solution Best IT Service!

You still have time to vote Digital Age Solution as the Best IT Service in the Frederick News Post Best of the Best! Friday, November 23, 2020 is the last day to vote, and you can vote EVERY DAY!

We’d really appreciate your vote! So, vote early and often!

Person of Interest & Crowd Notifications Added to Security Cameras

Our Verkada Security Cameras just added new functions to its already powerful People Analytics.

Person of Interest Notifications

Now, users can set up proactive SMS and e-mail notifications to alert specific people or teams when a matching face is detected by a camera. A person of interest profile is created by using an uploaded image or an existing face detected by People Analytics on your cameras.

If a matching face is detected, you’ll be alerted by your choice of SMS or e-mail.

Crowd Notification

In today’s environment with COVID-19 restrictions and protests, our cameras will now notifiy you if a group has gathered in a location. You can set the limit of group size between 2 and 10 people, and be alerted if a group exceeds that number.

Should there be no more than ten people gathered in an area of your building or outside your doors?

Verkada’s People Analytics will detect and count faces. If the number exceeds your threshold, you will be notified.

Business Planning for the Coronavirus

By Bill Conerly | Forbes

Business leaders are asking about the impact the COVID-19 coronavirus will have on the economy, and what they can do to help their employees. Along with looking out for staff, businesses should also be considering prepping their own infrastructure for a disaster. There’s a good chance that not too much will happen to business plans, but there is a small possibility of severe problems.

Medical professionals have plenty of unanswered questions, but certain facts are known:

  • COVID-19 symptoms resemble common colds and flu, including coughing and fever. By the time a quarantine has been put into effect, some infected people have already left the quarantine area. So expect the disease to spread.
  • A vaccine will take at least a year to develop, test and distribute – and that’s the best possible case.
  • A treatment to mitigate harm may come soon, but there are no guarantees that one will be found.
  • The disease seems to be most deadly to the elderly and those with existing medical problems.

The World Health Organization reported (update on 27 February 2020, updates to be published) that the Hubei Province had 65,596 confirmed cases cumulatively, in a population of 59 million people, producing an incidence of just over one in 1000 people. So far 81% of the cases have been mild. The evidence so far denies reason to panic, but justifies contingency planning.

Business challenges fall into two categories: direct effects and quarantine/restriction effects.

The most likely direct business problem is several workers falling ill around the same time. Because the disease spreads best when people are close, cases are likely to cluster among different work groups. One team working in close quarters may have several people get sick, while others in the company remain healthy. Thus, companies could lose one or two functions while otherwise operating at full capacity. Workers in open office spaces take more sick days than people in enclosed offices, so the company’s work environment affects their risk.

The most likely direct business problem is several workers falling ill around the same time.

The key business issue is what functions are lost when the illness takes hold. If the engineering department is late producing a new prototype, the company rolls on. If new order processing is struck, then the company could be severely damaged. And if a function such as tech support or production scheduling is hit, then slowdowns would spread across the business.

Companies may also face problems from quarantines, travel controls and limits on public assemblies. Public transportation may be closed or limited. These indirect effects are causing most of the economic damage in China.

Absenteeism among healthy workers may increase, as they stay home to care for sick relatives. They may also be unable to get to work if public transportation is shut down or they live in a quarantined area.

An existing disaster recovery plan may provide a good blueprint, though some do not address epidemics. Even then, however, they may list critical areas to consider. Businesses without recovery plans might consider these practices:

Tell sick employees to stay home. Businesses that do not offer paid sick leave should consider temporarily offering sick leave.

Identify critical employee groups. This could be a shipping department, payment processing team or any functions that the company absolutely must have operating every day. Then consider whether some of these functions can be covered by employees at a different location. For example, is it possible for one regional office to provide service to another regional office whose employees are sick?

With many people working at home, businesses need protocols to limit security risks.

Ensure that work-from-home systems are running well, which includes computer security. Many businesses are now scammed by a fake email that tells an employee to send a payment to a new supplier. With many people working at home, businesses need protocols for phone conversations to limit this risk.

Talk to critical suppliers of both goods and services about their ability to deliver reliably. Forward this article along to them, then have a conversation. Consider setting up alternative suppliers.

Identify employees with critical skills who are not easily replaced on short notice. Look for others who could learn the task, recent retirees or consider an outsourcing plan.

Plan to close some of your locations. Think through security and equipment maintenance issues ahead of time.

Most epidemics have a severe spike, followed by diminished disease incidence. The population builds up immunity, preventing further spread of the virus. This appears to have already happened in China, but not in Europe. So this outbreak probably won’t last too long. Epidemiologists note that sometime an epidemic flares up a second time, so uncertainty reigns.

This article was written by Bill Conerly from Forbes and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to

Tips for Secure Remote Working During the Coronavirus Outbreak

Working from home is not complicated. Most of us do so now and again. Accessing an internet connection is easy enough, and cloud office suites and SaaS applications make it seamless to transition from working at the office to doing so on the couch in your living room. But most organizations will not have supported so many employees working remotely, and employees themselves may be a little out of practice in observing best practices when working from home.

So now is definitely the time to review and enhance security around remote access to corporate data, at both ends of the connection.

Here are tips for secure remote working for employees, and for their employers.

Best practices for employees

We naturally tend to be more relaxed at home, especially when it comes to security. After all, we’re in the safety of our own homes, so what could go wrong? Unfortunately, cyber criminals are seeking to exploit exactly this sort of complacency with carefully-engineered phishing exploits and threats.

Here is some advice for employees:

  • Pay attention to passwords: It’s a good idea to review and strengthen passwords that you use for logging onto remote resources, such as email or work applications.
  • Be phishing-aware: Be wary of clicking on links which look in any way suspicious, and only download content from reliable sources that can be verified.

Research teams have uncovered that domains related to coronavirus are 50% more likely to be malicious.

Remember that phishing schemes are a form of social engineering, so if you receive an email with an unusual request, check the sender’s details carefully to make sure that you are communicating with colleagues, not criminals. Research teams have uncovered that domains related to coronavirus are 50% more likely to be malicious, so make sure to cast a critical eye over anything unexpected that pops into your mailbox.

  • Choose your device carefully: Many employees use their company computer or laptop for personal use, which can create a security risk. The risk is even greater if you use a personal computer for work purposes. If you have to use a home or personal computer for work, talk to your IT team about how to strengthen security – for example, by adding a strong anti-virus and security package to it.
  • Who’s listening in?: Does your home wi-fi network have a strong password, or is it open? Make sure it is protected against anyone within range being able to access and connect to the network.

Best practices for employers

This guide should serve as a starting point for organizations, whether their apps and data are stored in data centers, public clouds or within SaaS applications:

  • Trust no one: Your entire remote access plan has to be built using the mindset of zero trust, where everything must be verified and nothing should be assumed. Make sure that you understand who has access to what information – segmenting your users and making sure that you authenticate them with multi-factor authentication. Additionally, now is the time to re-educate your teams so that they understand why and how to access information safely and remotely.
  • Every endpoint needs attention: In a typical scenario, you might have people working on desktops inside the office. Assuming that their devices aren’t going home with them, you now have a slew of unknown devices which need access to your corporate data.
  • You have to think ahead about how to handle the threats posed by data leakage or attacks propagating from a device into your network. You also need to ensure that the overall security posture of devices is sufficient.
  • Stress-test your infrastructure: In order to incorporate secure remote access tools into your workflows, it’s critical to have a VPN or an SDP. This infrastructure must be robust and should be stress-tested to ensure that it can handle a large volume of traffic, as your workforce shifts gears to work from home.
  • Define your data: Take the time to identify, specify and label your sensitive data, in order to prepare for policies that will make sure that only the appropriate people can access it.
  • Make no assumptions about previous data management, and take a granular approach which will serve you well once remote access is fully enabled. No one wants to accidentally provide the entire organization with access to HR.
  • Segment your workforce: Run an audit of your current policies relating to the access and sharing of different types of data. Re-evaluate both corporate policy and your segmentation of the teams within your org, so that you can rest assured that you have different levels of access which correlate with the various levels of data sensitivity.

These cornerstones of remote access security will help organizations better protect their data and networks against threats and interception at both ends of the connection.

This article was from and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to