Whether you are looking to install a business phone system or replace an old model with a new phone, you will need to understand the options that are ...
Those of us at DCG continue to make your - and our - network security our highest priority. It's both simple and vital that you ensure both your home and business network is secure from malware, viruses and hackers.
The National Security Agency (NSA) published guidelines on network security that we feel are crucial when working to keep your network safe.
Smartphones have become a daily saving grace for most everyone, while at the same time can cause a catastrophe if lost or stolen. These mighty devices, which hold a tremendous amount of personal information, are easy to lose, easy to steal, and can easily fall victim to viruses and spyware.
There is a variety of blended threats in cyberspace, and it's important for you to know not only that you're protected, but that you're protecting yourself in the most cost efficient way.
In addition to viruses, there is the constant looming threat of malware.
Attention PC and Mac users: This applies to all of you.
Important updates have been released by both Adobe and Oracle to fix major security issues with their software. Oracle's Java plugin, as well as Adobe's Acrobat and Adobe Reader, were recently subject to hackers belonging to an Eastern European ring, with as many as 40 companies falling victim to the Java security breach on both Macs and PCs.
Those using Java on Windows systems are advised to remove Java altogether, or at least unplug it from the browser most often used.
Ransomware scams are on the rise, with 2012 seeing an increase in the number, size and scope of scams, according to anti-virus software giant Symantec.
Malware literally holds your PC hostage by locking or disabling it while displaying a demand for payment of a ransom, or what the crooks behind it call a "fine.
Ask yourself, "Will my business be able to recover all of it's data should a technological or natural disaster occur tomorrow?" Even if your answer is yes, how long will the restore take and will you be operating at 100% as quickly as you would like?
We are forever adjusting our business practices as technology grows, especially with all of the efforts by many clients to go "paperless" with invoicing, correspondence, and even contracts.
PDFs are one of the most common files used in business. They are easy to make and contain all of the images and formatting of a paper original. Their ubiquity also makes them a target for hackers. Attacks utilizing PDF files have risen dramatically recently from 11 % of attacks to 49 % according to Symantec.
Windows updates can be frustrating and confusing. They are constantly being released and it is difficult to tell the difference between the ones that are really essential and the ones that are just going to take up space on your hard drive. Microsoft marks the updates according to importance and we give a rundown of each below.
Are you worried about people snooping around in your office when you are away? Catch thieves and snoops with this free program for your webcam. Although webcams have been around for years, recording from them hasn't been worthwhile, since it can rapidly fill up your hard drive.
Credit cards are what make online shopping a breeze. Enter the numbers on your card and within minutes you’re done. The ease of credit card transactions has also attracted thieves and even if you are extremely careful (deleting your browsing history, only using secure sites etc.