Technology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...

Need a fresh perspective on IT Support in Los Angeles?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live.
Stop worrying and get the IT Support your business needs.
Contact me for a FREE on-site walk through.
Learn moreNeed a fresh perspective on IT Support for your manufacturer, accounting, or distribution business?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live and we respond quickly
Stop worrying and get the IT help your business needs.
Contact me for a FREE on-site walk through.
Learn moreTechnology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...
An important part of our CyberSAINTTM security platform is our FREE training. All DCG clients enjoy a new training method that you can leverage to better train and prepare your employees for social engineered cyber-attacks. The training is simple and fast, yet covers topics that will keep them safe. Are you onboarding new employees? ‘Get them trained and stay safe with DCG’s CyberSAINT FREE security training.
Contact me for a FREE on-site walk through.
Learn moreWhile there are many similarities among hackers, there are also some key differences among them. Some hackers want money for themselves and resort to ...
DCG exists to help our clients choose, deploy, and manage proven cloud technologies that achieve worry free, always on IT infrastructure. That's why forward thinking, and agile small businesses who need to leverage cloud technology to beat their competitors count on DCG.
Contact me for a free cloud readiness assessment.
Learn moreThe cloud is a rapidly emerging technology that is likely here to stay. Its flexibility allows businesses to mix and match their cloud exposure, keeping ...
Forward thinking, and agile small businesses who need to leverage Information technology to beat their competitors count on DCG. DCG exists to help their clients choose, deploy, and manage proven technologies that achieve worry free, always on IT infrastructure.
START NOWPDFs are one of the most common files used in business. They are easy to make and contain all of the images and formatting of a paper original. Their ubiquity also makes them a target for hackers. Attacks utilizing PDF files have risen dramatically recently from 11 % of attacks to 49 % according to Symantec. Attacks on PDFs have even surpassed the perennial winner in this category, Internet Explorer.
The way these attacks often work is that a hacker places a link to a PDF on a web page. Checking the domain at the bottom of your browser window, a common way to check if a site is legitimate, doesn't work for these files, since they are simply PDFs. Once you open the file it will start to run the malicious software. Normally a pop up will appear asking you to if you want to proceed. Hackers can change this to something that allays a user's suspicions, causing even cautious users to click to run the malicious software.
We have a few tips to help you avoid these exploits. In Adobe Reader go to Edit ● Preferences ● Trust Manager● Deselect Allow documents to open other files and launch other applications. Another possible solution is to use an alternative to Adobe Reader. Readers like Foxit automatically block embedded programs from running and avoid several common security flaws in the standard reader.