Technology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...

Need a fresh perspective on IT Support in Los Angeles?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live.
Stop worrying and get the IT Support your business needs.
Contact me for a FREE on-site walk through.
Learn moreNeed a fresh perspective on IT Support for your manufacturer, accounting, or distribution business?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live and we respond quickly
Stop worrying and get the IT help your business needs.
Contact me for a FREE on-site walk through.
Learn moreTechnology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...
An important part of our CyberSAINTTM security platform is our FREE training. All DCG clients enjoy a new training method that you can leverage to better train and prepare your employees for social engineered cyber-attacks. The training is simple and fast, yet covers topics that will keep them safe. Are you onboarding new employees? ‘Get them trained and stay safe with DCG’s CyberSAINT FREE security training.
Contact me for a FREE on-site walk through.
Learn moreWhile there are many similarities among hackers, there are also some key differences among them. Some hackers want money for themselves and resort to ...
DCG exists to help our clients choose, deploy, and manage proven cloud technologies that achieve worry free, always on IT infrastructure. That's why forward thinking, and agile small businesses who need to leverage cloud technology to beat their competitors count on DCG.
Contact me for a free cloud readiness assessment.
Learn moreThe cloud is a rapidly emerging technology that is likely here to stay. Its flexibility allows businesses to mix and match their cloud exposure, keeping ...
Forward thinking, and agile small businesses who need to leverage Information technology to beat their competitors count on DCG. DCG exists to help their clients choose, deploy, and manage proven technologies that achieve worry free, always on IT infrastructure.
START NOWThe Internet radically changed the way a whole host of businesses operated, booksellers, airlines, and especially coffee shops. A coffee shop used to be a place primarily for the drinking of coffee and socializing; now many people use it as a second office. While this may be convenient, it's also unsafe for your company's information. Most of these networks are unsecured, allowing anyone to snoop on your private data. And while some coffee shops use encryption, this isn't much better if everyone is sharing the key. We have compiled several methods to help you keep your sensitive information private, whether at a coffee shop, airport, or hotel.
If your company has a VPN, that is the most secure way to connect with a public hot spot. With a VPN your data is encrypted, with a secure path back to your company's web servers. This will keep secure your company's email and other data. In addition, if you are travelling in a country that restricts access to parts of the internet, such as China, you'll have unfettered access to the internet, since the pages are served to your company's servers, not local ones. If your company doesn't have a VPN, Hotspot Shield offers an excellent alternative. Although not as secure as a private VPN, since your data travels unencrypted from Hotspot Shield's data center to the web site you are accessing, it is still better than surfing with no protection at all.
If you don't want to use a VPN, then you should at least consider a secure connection for email. Most email services use HTTPS, an encrypted connection to a website, for their log in page. However for many web mail services this is where the protection stops. Gmail and enterprise email systems (Lotus Notes or Microsoft Exchange) use encryption throughout and are probably the only services you would want to be using at a public hot spot.