𝔻𝕚𝕘𝕚𝕥𝕒𝕝 𝕊𝕒𝕚𝕟𝕥𝕤 Solutions 

𝔻𝕚𝕘𝕚𝕥𝕒𝕝 𝕊𝕒𝕚𝕟𝕥𝕤 Solutions 

Menu

At Your Fingertips 

12 Apr 2026
Protect your small business against bad actors

Protect your small business against bad actors

Protect Against Bad Actors: Social Engineering Primer 

What is Social Engineering

Social Engineering is a catch all term for extracurricular ways a person may gain access to your private, sensitive networks and digital infrastructure. Attacks using social engineering can include what appear to be legitimate contact attempts to reset a password, to make IT related claims, or to temporarily gain access to a private network.

Anyone Can Be A Victim 

Small businesses are commonly targeted for three reasons. Those reasons are:

  1. Lack of critical network hardening or digital asset protection protocols. 
  2. Lack of an in house or commissioned IT department or project manager for IT related assets / tasks 
  3. Lack of knowledge regarding best practices 
  4. Lack of regulation or oversight for equipment connected to business networks such as computers or cellphones 


It only takes ONE successful attack to put you and your company or small business at risk. Smart people, including CEOs of large companies and government liaisons have fallen victim to social engineering attempts that may have seemed innocent or harmless at first. Once an account has been compromised, it can be almost impossible to recover any lost digital assets, data, or funds unless quick action is taken. 


What You Can Do 

The steps to protecting yourself against these attacks may seem redundant and simple, but they are the best practices as we currently live in a 'zero trust' world. If anyone is pretending to be a friend of your business in order to gain reputation and trust, you should be vigilant and wary of this person around your devices connected to your business network. Simple practices for protecting yourself go a long way to stop people like this in their tracks. This includes:

  1. Regularly resetting passwords to all connected accounts. This may also include a credentials change in certain frameworks, which involves both login credentials and passwords or keys. 
  2. Use single sign on if possible. Setting up a passkey or 2FA is the next best thing. Passkeys can be setup using virtually any device or a portable physical passkey thumb drive device. 
  3. Credentials for anyone that may be no longer involved with your business should be removed from the network IMMEDIATELY to prevent potential retaliation for dismissal or to mitigate any possibility of misuse. 
  4. Use forwarding email so that your actual email address is never revealed to the public as this can compromise accounts associated with your business. 
  5. Keep payment processing on a separate, secure network. 
  6. Do not allow employees to log in remotely to business networks unless using an approved device with VPN. 
  7. Consider using VPN for your business network to further harden your network against bad actors that may be able to access remote systems. 
  8. Update your operating systems and devices regularly, as much as possible. 
  9. No need to invest in an anti virus software or anti malware protection unless you are government contracted or handle sensitive consumer information subject to privacy laws such as HIPAA. 
  10. Contact your agent immediately if you suspect your accounts are compromised. We may be able to help. The sooner an attack or breach is reported, the faster we can assist you! Reach out, don't be the fall out guy. 
13 Jan 2026

⭐PhotoCircle Update 

As of January 3rd 2026, your Photocircle Circle has been replaced. Contact your agent or log in to your portal to access your NEW Photocircle sharing group. 

ℹ️Download for iOS, Android 

For the past 3 years, we have partnered with Photocircle to offer our clients an easy platform for sharing uploaded media and facilitating client approval > publish workflow for agents engaged in marketing / advertising.


In the past, Photocircle only offered one premium tier account that serviced businesses, organizations, and individuals. As of January 2026, Photocircle has ended this legacy program and thus, we have renewed our licensing under the terms and reissued seats to agents that were currently using Photocircle. 


⭐What This Means:


Your previous Photocircle will be deleted and inaccessible if it has not been already. You can find your new invitation in your portal, Drive, or contact your agent to receive your invite via QR code, email, or text. 


You will not lose access to nor will your agent lose access to any content uploaded to your circle - DSS utilizes multiple backups to ensure that your media and data are secure should anything like this happen. The only media that may have been lost is media that was being uploaded to or available for download but not downloaded before the switch. This content will need to be resubmitted. 


However, when you first log in to your new Circle, you may notice that there is content missing. Depending on your needs, your agent may or may not duplicate your media files or choose to work off backups for now and only use Photocircle for sharing and approval for new media uploads from the transition date. 



If you need access to any of the media available on your previous Circle that was removed during this process, contact your agent or review your Google Drive link, as you may find backups of media there. We apologize for any inconvenience during this transition. 

Name:
Comment:
Cookie settings
©2024 Digital Saints Solutions - Samantha Luck
X
This site uses cookies to offer you a better browsing experience.
You can accept them all, or choose the kinds of cookies you are happy to allow.
Privacy settings
Choose which cookies you wish to allow while you browse this website. Please note that some cookies cannot be turned off, because without them the website would not function.
Essential
To prevent spam this site uses Google Recaptcha in its contact forms.

This site may also use cookies for ecommerce and payment systems which are essential for the website to function properly.
Google Services
This site uses cookies from Google to access data such as the pages you visit and your IP address. Google services on this website may include:

- Google Maps
- Google Fonts
Data Driven
This site may use cookies to record visitor behavior, monitor ad conversions, and create audiences, including from:

- Google Analytics
- Google Ads conversion tracking
- Facebook (Meta Pixel)