Small and Midsize Businesses (SMBs) are Victims of Data Breaches
Employee Security Training is the Way to Best Prepare Your Employees
For the New Threats.


DCG's CyberSAINT™ scans help us manage the risk and help provide additional visibility into threats on your network.

As you may have seen in the news lately, ransomware attacks has joined the large number of other threats that may affect your network from the inside and the outside. Most ransomware attacks occur from employees opening infected email attachments or links, that they shouldn't have opened.

What is Ransomware? It is a malware program that encrypts your most important data files using an encryption key that only the attacker knows. You're then told to supply the blackmailer with money in exchange for the decryption key needed to unlock your data. This can be very expensive if you do not have a current backup.

What is spear phishing? Malicious attackers focus on one or more employees in your company and craft socially engineered email that attempts to get them to follow a link or open an attachment. The attackers are remarkably successful way too often so employee security training is needed in order to better understand these threats.


DCG Featured in Pen Test Magazine


Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, LCC

Are you doing enough to protect your organization? How do you know if your business is safe?

Security is clearly a hot topic this year. And everyone is at risk. With an estimated infection rate of 30% across all computers, most offices have something already inside their security perimeter that could potentially cause serious damage. News stories from the political, financial, entertainment and healthcare sectors all show systems and data are under attack. These issues are leading to the undermining of our institutions and businesses in the Los Angeles area and beyond.

From viruses and phishing scams to ransomware and hackers, the electronic world has become a dangerous place. Your business is increasingly dependent on your IT infrastructure and those systems are now interconnected – open to an ever-expanding host of devices and access points.

We can help. Contact us for more information about Security Assessments. Contact DCG and stay safe!

Please see the details below for the two scans we recommend for all companies. We also offer CyberSAINT™ HIPPA and CyberSAINT™ PCI compliance assessment scans if your business is affected by either of these issues.



Client Risk Report

The report presents you with a summary of your overall risk score based on the scan of your network, along with simple charts to show the problem areas.


Network Management Plan

This report will help prioritize issues based on the issue's risk score. A listing of all affected computers, users, or sub-systems is provided along with recommended actions.


Full Network Assessment Report

Our scan will pull out literally hundreds of pages of end-user network activity and configuration data. The Full Network Assessment Report includes every detail, presented in line-item fashion in an editable report document. The report is organized by section with a table of contents to help you locate the specific findings of interest. Pproblem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.


Asset Detail Report

For each network scan, this report provides detailed information on each of the individual assets discovered by Network Detective. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.



Network Security Risk Review

This report includes a proprietary Security Risk Score and chart showing the relative health (on a scale of 1 to 10) of the network security, along with a summary of the number of computers with issues. This tool also reports on outbound protocols, System Control protocols, User Access Controls, and an external vulnerabilities summary list.


Network Security Management Plan

This report will help prioritize issues based on the issue's risk score. A listing of all security related risks are provided along with recommended actions.


Network Security PowerPoint

A PowerPoint presentation is generated from the Network Detective. General summary information, as well as the risk and issue score, is presented along with specific issue recommendations and next steps.


External Vulnerabilities Scan Detail Report

A comprehensive output including security holes and warnings, informational items that can help make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open.


Outbound Security Report

Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.


Security Policy Assessment Report

A detailed overview of the security policies that are in place on a domain-wide and local machine basis.


Share Permission Report

Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.


User Permissions Report

Organizes permissions by user, showing all shared computers and files to which they have access.


User Behavior Analysis Report

Shows all logins, both successful and failed, by user. Report shows service accounts that are not properly configured (and thus failing to login) as well as users who may be attempting (and possibly succeeding) in accessing resources (computers) that they should not be.


Login History by Computer Report

Same data as User Behavior but inverted to show you by computer. This summary is quite useful, in particular, for looking at a commonly accessed machine (file server, domain controller, etc.), or a particularly sensitive machine for failed login attempts. Some examples would be the CEO’s laptop or the accounting computer where you want to be extra diligent in checking for users trying to get in.


Login Failures by Computer Report

Identifies users who have succeeded in logging in to another machine. Great for auditing/logging purposes to know of all attempts.


Watch This Security Tip Video on How to Catch Bank Fraud Early


A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”


Brent Whitfield
Contact me for a FREE on-site walk through.

Watch This Security Tip Video on How to Catch Bank Fraud Early