1,938,383

records lost or stolen
every day

80,766

records lost or stolen
every hour

1,346

records lost or stolen
every minute

22

records lost or stolen
every second

Source: Breach Level Index (Gemalto)

On average,

71%

of security breaches target
small businesses, costing

$158 /record

(average cost per stolen record*)

icon_laptop

*Source: 2016 Cost of Data Breach Study: Global Analysis by Ponemon Institute

60%

of small firms go out
of business within

6 Months

of data breach*

*Source: National Cyber Security Alliance

icon_folderSec

Don’t Be A Statistic.
Protect Yourself From A Breach.

  • Security Risk Assessment
  • Phishing Campaigns
  • Employee Security Training
  • Security Newsletters
  • Security Policies
  • Breach Response Services

DCG Featured in Pen Test Magazine

pentest

Businesses Should Outsource Security To Their IaaS Provider

by Brent Whitfield, CEO DCG Technical Solutions, Inc.

Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.

A message from the CEO

“Our pro-active approach to IT is ideally suited for companies who depend on reliable IT infrastructure, but don’t want to spend a lot of money to keep it that way.”

Brent-Whitfield_Signature

Brent Whitfield
CEO
213-261-3998
Contact me for a FREE on-site walk through.

cybersaint_logo

DCG Security Blog

Defend against this new Office 365 threat

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted ...

Read more

Mitigating cybersecurity insider threats

Did you know that in some industries the biggest cybersecurity threats come from inside a breached organization? Sometimes it's motivated by financial ...

Read more

Security audits are more crucial than they seem

Security audits are an excellent way to set the benchmark for your company’s data integrity. It is also a reliable way of identifying gaps in your system ...

Read more

How to strengthen your BYOD security

Mobile technology has drastically changed the way we live. And just as many people have “cut the cord” in their homes and now rely on their smart ...

Read more