1,938,383

records lost or stolen
every day

80,766

records lost or stolen
every hour

1,346

records lost or stolen
every minute

22

records lost or stolen
every second

Source: Breach Level Index (Gemalto)

On average,

71%

of security breaches target
small businesses, costing

$158 /record

(average cost per stolen record*)

icon_laptop

*Source: 2016 Cost of Data Breach Study: Global Analysis by Ponemon Institute

60%

of small firms go out
of business within

6 Months

of data breach*

*Source: National Cyber Security Alliance

icon_folderSec

Don’t Be A Statistic.
Protect Yourself From A Breach.

  • Security Risk Assessment
  • Phishing Campaigns
  • Employee Security Training
  • Security Newsletters
  • Security Policies
  • Breach Response Services

DCG Featured in Pen Test Magazine

pentest

Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, LCC

Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.

A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”

Brent-Whitfield_Signature

Brent Whitfield
CEO
213-261-3998
Contact me for a FREE on-site walk through.

cybersaint_logo

SECURITY TERMS FAQ

In order to precisely illustrate cyber security for our clients, we think an understanding of the fundamental vocabulary involved is important:

Software designed to recognize when an attachment, document or application is infected, eliminating the virus before damage can be done.

A usually unintentional release of proprietary data into an unsecure setting.

Using algorithms, an attempt by trial and error to guess and eventually unlock secure data such as usernames, passwords, hidden web pages, or encrypted messages.

Often described as a phonebook for the Internet, this system tracks and regulates Internet domain names and Internet Protocol (IP) addresses.

An algorithm is used to change plain text into what is known as cipher text, which scrambles regular text into unreadable data.

Based on pre-designated security guidelines, this is a computer system’s first barrier to cyber threats, blocking unauthorized access to the system while still allowing outward communication.

Term used to describe all kinds of malicious software, including ransomware, adware, spyware, scareware, trojan horses, computer viruses, and worms.

A division of the Department of Commerce that promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

A company and service which extends the Domain Name System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.

A software update to fix or improve a computer program, operating system, or application’s usability and performance.

Scammers often send “phishing” emails that appear to be from reputable sources with the intention of obtaining personal data such as passwords, social security or credit card numbers.

Malicious software, spread through attachments, infected websites, etc., that literally holds your computer hostage, blocking your access to the system, until a certain amount of money is paid to unlock it.

We think it is important for our clients to know that in the current cyber world there will always contain a certain level of risk. However, your risk level will be lowered considerably with the right managed security services provider. Together you can establish what is both a fair amount of risk and what is needed to keep their risk as low as possible. Clients must have the understanding that attacks typically happen multiple times per day, and basic security is very effective at preventing these attacks. In the instance when an attack does get through security, discuss with your client how their business is equipped to handle it.

DCG Security Blog

What does proactive cybersecurity entail?

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. All businesses embrace the idea of preventing cyberattacks ...

Read more

Why using a VPN is more important than ever before

In the past, a simple antivirus software was all you needed to stay safe from online threats. Today, it takes more than that to protect your PC and the ...

Read more

Helpful tips for keeping your email safe

Email is one of the best things the internet has given us. We use it to sign up for websites, apply for jobs, make payments, get in touch with friends ...

Read more