1,938,383

records lost or stolen
every day

80,766

records lost or stolen
every hour

1,346

records lost or stolen
every minute

22

records lost or stolen
every second

Source: Breach Level Index (Gemalto)

On average,

71%

of security breaches target
small businesses, costing

$158 /record

(average cost per stolen record*)

icon_laptop

*Source: 2016 Cost of Data Breach Study: Global Analysis by Ponemon Institute

60%

of small firms go out
of business within

6 Months

of data breach*

*Source: National Cyber Security Alliance

icon_folderSec

Don’t Be A Statistic.
Protect Yourself From A Breach.

  • Security Risk Assessment
  • Phishing Campaigns
  • Employee Security Training
  • Security Newsletters
  • Security Policies
  • Breach Response Services

DCG Featured in Pen Test Magazine

pentest

Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, Inc.

Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.

A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”

Brent-Whitfield_Signature

Brent Whitfield
CEO
213-261-3998
Contact me for a FREE on-site walk through.

cybersaint_logo

DCG Security Blog

A complete guide to juice jacking

Smartphones have become such a vital component of the modern lifestyle to the point that we are always glued to them. And as our time with our gadgets ...

Read more

No ransom: A place for free decryption

Although a ransomware attack may seem targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, and the ...

Read more

Keeping Facebook and Twitter safe from hackers

Keep your guard up! Pranksters, malicious attackers, and hackers come in different forms, but they are all after your online privacy and security — ...

Read more

A primer on watering hole attacks

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored ...

Read more