DCG Technical Solutions and StorageCraft Work Together on Disaster Recovery

DCG Technical Solutions, based in Los Angeles, California, has been an MSP - first a VAR, and then MSP - since 1993. We have a valuable and interesting relationship with StorageCraft - a relationship that actually goes back to 2005.

We’ve been associated with StorageCraft and their products for about 11 years and the one thing that – if another partner asked me, “Well, what are you going doing for BDR? What are you guys doing for disaster recovery?” - one of the reasons I say StorageCraft is because we’ve never, ever had a problem with the restore.

IT Support in Los Angeles Harbors ‘Yesterday Men’!

Being in the IT industry for many years now, I've had the opportunity to work with many IT support consultants in Los Angeles, but it's always sad to see some who seem like they were born "yesterday". IT is a fast-paced industry, and one can't call himself "good" if he can't keep up with the pace.

“The Cloud” Explained

These days, if you listen long enough or read far enough about small- to medium-sized businesses (SMBs), you’re bound to hear a lot of polarizing ideas about “The Cloud” and how it is revolutionizing everything—both positively and negatively.

Top 10 Data Breaches of 2015 [INFOGRAPHIC]

Over the past two years, the average total cost of a data breach has increased 23% reaching an astronomical $3.79 million.

The year 2015 saw some of the worst IT hacks ever. Physhing schemes, cyber attacks, compromised medical records, exploited tax records, the installation of malware backdoors are only some of what wreaked cyber security havoc for some reputable companies.

Data Breaches of 2015 — The Top 10 Worst IT Hacks of the Year – IT Support Los Angeles

Data Breaches of 2015 -- The Top 10 Worst IT Hacks of the Year

Did you know the average total cost of a data breach is up over the past two years, increasing by 23%? That's total $3.79 million.

Premera Blue Cross – January. The first of three major healthcare breaches to make the list, this example was believed to be triggered by a phishing scheme that infected victims with malware.