

DCG Provides the security protections your business needs
With the help of St. Bernard from DCG Technical Solutions, LLC companies can identify and respond quickly to their most pressing security issues and the potential for a breach. St. Bernard ManagedCARE™ provides the proactive monitoring needed to keep security tools, and consumer operating systems patched and updated.
Let DCG reduce service costs and minimize network downtime so you can focus on building your business, not on fixing your network.
In light of the recent high-risk security threats, DCG is reaching out to our clients to review two-factor authentication (2FA – this is also known as multifactor authentication) options for your organization. This is the first step in DCG’s ZERO-Trust initiative. 2FA is an extra step added to the log-in process of applications, such as a code from your phone or a fingerprint scan, that helps verify your identity and prevents cyber-criminals from accessing your accounts. Accoding to a recent article, password which contains Numbers, Lowercase and Uppercase letters with a symbol and 8 character long is tough to crack and it may take approax 8hrs or less. 2FA is the best way to protect your accounts from unauthorized access and it should be applied to Mail, Server Logins, VPN connection login, Remote access and 3rd party webapps.
Ready to set up 2FA? Click this link to grab a spot on calendar.
DCG’s CyberSAINT™ scans help us manage the risk and help provide additional visibility into threats on your network.
More than 75% of data breaches target small and medium sized business (SMBs), and that can result in costs both financially and to your reputation.
We take care of your infrastructure end-to-end, leaving you free to focus on your core business, innovation, and growth. DCGLA IT Support Services equips your business with an enterprise-level IT department and IT Helpdesk at highly reasonable fees.
We take care of your infrastructure end-to-end, leaving you free to focus on your core business, innovation, and growth. DCGLA IT Support Services equips your business with an enterprise-level IT department and IT Helpdesk at highly reasonable fees.
Cyber attacks are increasingly one of the biggest threats to your organization.Take this Risk-Assessment to uncover your vulnerabilities.
We want to learn about you and your business, how you need your technology to operate, and the direction you are heading. We want to know what went right and went wrong with your current provider of IT support.
This critical meeting helps us establish our relationship so we can quickly solve your IT problems, better protect you from the latest security threats, and digitally transform your business. We will perform an honest IT assessment of your current network and systems to determine what may or may not be needed to help you reach your goals.
We begin to align with our clients goals and aspirations on your very first call to our service desk. We expand on that knowledge during our in person on-site walk thru and subsequent meetings up to and including the onboarding.
Our client first methodology requires that we do a thorough look at your network and servers, and provide the DCG Baseline of protection that includes endpoint protection and our patch management tools. For many of our clients, this is the first comprehensive look at the Security, Network, and Applications that make up their IT infrastructure.
Yes, we’ve got a plan that incorporates our key learnings from our conversations and your onboarding visit. The network and security scans of your network help us prioritize action items needed to protect you from hackers and provide quick recovery in case of a fire or theft. Our strategic IT roadmap definitely includes items that will move your business forward.
This is the fun part! During the Road Map session we decide together on how to prioritize the work. We help you fit the needed items into your budget because we execute the roll out of the road map items over time.
Now that you are safe and secure, DCG moves you into “IT Support/Maintenance” mode. We let you forget about IT and instead focus on growing your business. We know IT can interrupt your success which is why all “Site down”, “Server Down”, “Internet Down”, or “Mail Down” situations are hot transferred to a level 3 engineer. That is how we keep downtime to a minimum.
AT DCG, we ease the pain of maintaining an in-house IT infrastructure let alone handling the internal resources. You’ve got questions? We’ve got answers! Here are a few questions that small businesses in Los Angeles ask us.
Still have a question?
Reach out to our IT security experts
Software designed to recognize when an attachment, document or application is infected, eliminating the virus before damage can be done.
A usually unintentional release of proprietary data into an unsecure setting.
Using algorithms, an attempt by trial and error to guess and eventually unlock secure data such as usernames, passwords, hidden web pages, or encrypted messages.
Using algorithms, an attempt by trial and error to guess and eventually unlock secure data such as usernames, passwords, hidden web pages, or encrypted messages.
An algorithm is used to change plain text into what is known as cipher text, which scrambles regular text into unreadable data.
Based on pre-designated security guidelines, this is a computer system’s first barrier to cyber threats, blocking unauthorized access to the system while still allowing outward communication.
Term used to describe all kinds of malicious software, including ransomware, adware, spyware, scareware, trojan horses, computer viruses, and worms.
A division of the Department of Commerce that promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
A company and service which extends the Domain Name System (DNS) by adding features such as phishing protection and optional content filtering in addition to DNS lookup, if its DNS servers are used.
A software update to fix or improve a computer program, operating system, or application’s usability and performance.
Scammers often send “phishing” emails that appear to be from reputable sources with the intention of obtaining personal data such as passwords, social security or credit card numbers.
Malicious software, spread through attachments, infected websites, etc., that literally holds your computer hostage, blocking your access to the system, until a certain amount of money is paid to unlock it.
We think it is important for our clients to know that in the current cyber world there will always contain a certain level of risk. However, your risk level will be lowered considerably with the right managed security services provider. Together you can establish what is both a fair amount of risk and what is needed to keep their risk as low as possible. Clients must have the understanding that attacks typically happen multiple times per day, and basic security is very effective at preventing these attacks. In the instance when an attack does get through security, discuss with your client how their business is equipped to handle it.
Gabriel Serrano, John Angelotti, Keith Brandt, Tommy Clark, Jarrett Kaufman
DCG Network Engineers
DCG: Implementing Cyber Security Solutions
Cybercrime netted a whopping $450 billion in profits last year, with 2 billion records lost or stolen worldwide. Security expert Caleb Barlow from IBM, calls out the insufficiency of our current strategies to protect our data.
Businesses Should Outsource Security To Their
IaaS Provider
By Brent Whitfield, President
President, DCG Technical Solutions, LLC