records lost or stolen
every day


records lost or stolen
every hour


records lost or stolen
every minute


records lost or stolen
every second

Source: Breach Level Index (Gemalto)

On average,


of security breaches target
small businesses, costing

$158 /record

(average cost per stolen record*)


*Source: 2016 Cost of Data Breach Study: Global Analysis by Ponemon Institute


of small firms go out
of business within

6 Months

of data breach*

*Source: National Cyber Security Alliance


Don’t Be A Statistic.
Protect Yourself From A Breach.

  • Security Risk Assessment
  • Phishing Campaigns
  • Employee Security Training
  • Security Newsletters
  • Security Policies
  • Breach Response Services

DCG Featured in Pen Test Magazine


Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, LCC

Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.

A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”


Brent Whitfield
Contact me for a FREE on-site walk through.



In order to precisely illustrate cyber security for our clients, we think an understanding of the fundamental vocabulary involved is important:

Software designed to recognize when an attachment, document or application is infected, eliminating the virus before damage can be done.

A usually unintentional release of proprietary data into an unsecure setting.

Using algorithms, an attempt by trial and error to guess and eventually unlock secure data such as usernames, passwords, hidden web pages, or encrypted messages.

Often described as a phonebook for the Internet, this system tracks and regulates Internet domain names and Internet Protocol (IP) addresses.

An algorithm is used to change plain text into what is known as cipher text, which scrambles regular text into unreadable data.

Based on pre-designated security guidelines, this is a computer system’s first barrier to cyber threats, blocking unauthorized access to the system while still allowing outward communication.

Term used to describe all kinds of malicious software, including ransomware, adware, spyware, scareware, trojan horses, computer viruses, and worms.

A division of the Department of Commerce that promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

A company and service which extends the Domain Name System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.

A software update to fix or improve a computer program, operating system, or application’s usability and performance.

Scammers often send “phishing” emails that appear to be from reputable sources with the intention of obtaining personal data such as passwords, social security or credit card numbers.

Malicious software, spread through attachments, infected websites, etc., that literally holds your computer hostage, blocking your access to the system, until a certain amount of money is paid to unlock it.

We think it is important for our clients to know that in the current cyber world there will always contain a certain level of risk. However, your risk level will be lowered considerably with the right managed security services provider. Together you can establish what is both a fair amount of risk and what is needed to keep their risk as low as possible. Clients must have the understanding that attacks typically happen multiple times per day, and basic security is very effective at preventing these attacks. In the instance when an attack does get through security, discuss with your client how their business is equipped to handle it.


Top IT security terms everyone should know

It’s every business user’s responsibility to protect their computers and data from cyberattacks. The good news is that you don’t need to be an IT ...

Read more

Protect your Facebook and Twitter from hackers

Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue ...

Read more

5 Ways systems can be breached

When it comes to business IT security, many small- and medium-sized businesses like yours often struggle to protect their systems from cyberattacks. One ...

Read more