records lost or stolen
every day


records lost or stolen
every hour


records lost or stolen
every minute


records lost or stolen
every second

Source: Breach Level Index (Gemalto)

On average,


of security breaches target
small businesses, costing

$158 /record

(average cost per stolen record*)


*Source: 2016 Cost of Data Breach Study: Global Analysis by Ponemon Institute


of small firms go out
of business within

6 Months

of data breach*

*Source: National Cyber Security Alliance


team cybersecurity heroes

Jarrett Kaufman, Keith Brandt, John Angelotti, Tommy Clark, Gabriel Serrano, DCG Network Engineers


(Note: all Cyber risk trends are increasing)



Interruption of business

Theft of intellectual property or competitive information

Destruction of data

Financial theft or fraud

Terrorism / Loss of life

Targeted Personal Attacks or Blackmail

Fake breach / Reputational extortion attack

Cyber-insurance Fraud

DDOS Infrastructure Ransom


Don’t Be A Statistic.
Protect Yourself From A Breach.

  • Security Risk Assessment
  • Phishing Campaigns
  • Employee Security Training
  • Security Newsletters
  • Security Policies
  • Breach Response Services

DCG Featured in Pen Test Magazine


Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, LCC

Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.


A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”


Brent Whitfield
Contact me for a FREE on-site walk through.



In order to precisely illustrate cyber security for our clients, we think an understanding of the fundamental vocabulary involved is important:

Software designed to recognize when an attachment, document or application is infected, eliminating the virus before damage can be done.

A usually unintentional release of proprietary data into an unsecure setting.

Using algorithms, an attempt by trial and error to guess and eventually unlock secure data such as usernames, passwords, hidden web pages, or encrypted messages.

Often described as a phonebook for the Internet, this system tracks and regulates Internet domain names and Internet Protocol (IP) addresses.

An algorithm is used to change plain text into what is known as cipher text, which scrambles regular text into unreadable data.

Based on pre-designated security guidelines, this is a computer system’s first barrier to cyber threats, blocking unauthorized access to the system while still allowing outward communication.

Term used to describe all kinds of malicious software, including ransomware, adware, spyware, scareware, trojan horses, computer viruses, and worms.

A division of the Department of Commerce that promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

A company and service which extends the Domain Name System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.

A software update to fix or improve a computer program, operating system, or application’s usability and performance.

Scammers often send “phishing” emails that appear to be from reputable sources with the intention of obtaining personal data such as passwords, social security or credit card numbers.

Malicious software, spread through attachments, infected websites, etc., that literally holds your computer hostage, blocking your access to the system, until a certain amount of money is paid to unlock it.

We think it is important for our clients to know that in the current cyber world there will always contain a certain level of risk. However, your risk level will be lowered considerably with the right managed security services provider. Together you can establish what is both a fair amount of risk and what is needed to keep their risk as low as possible. Clients must have the understanding that attacks typically happen multiple times per day, and basic security is very effective at preventing these attacks. In the instance when an attack does get through security, discuss with your client how their business is equipped to handle it.


Picking the right VPN for your business

Virtual private networks (VPNs) keep your online activities secure and private, which is especially useful if you're using a public Wi-Fi network. But ...

Read more