Cybersecurity Blog

Security Program
Cybersecurity Articles

Your Vendor is Lying to You

The Target breach illustrated just how important vetting third parties is. The hack was successful for a number of reasons (including Target’s failure to act on the

Read More »

Proactive Defense

A proper cybersecurity strategy consists of the right people, process and technology to effectively defend against today’s modern threats.

Reactive Services

If your data has been compromised or you suspect you are the victim of a data breach – take immediate action.

Security Services

CDG has successfully proven that an investment in cybersecurity can be a revenue generating activity, versus a cost center.

Incident Response

If you have been the victim of a cyber attack, contact us right now.

  • Determining the extent of a breach
  • Performing a full-scope response from Identification to Recovery
  • Incident Response retainer services, including IR preparation for your team