Cloud Security Incident Response

trojan attacks

Trojan Attacks

What are Trojan Attacks? In cybersecurity, a type of malware is called a Trojan horse or simply, a Trojan. Trojan attacks can come in many

Read More »
brute force

Brute Force Attacks

Brute Force Attacks Overview Have you ever forgotten the password for one of your accounts? Not wanting to click the “forgot my password” button and admit

Read More »
Ransomware Attack

Ransomware Attack

Ransomware Attack It is incredibly important for individuals and businesses to know how ransomware proliferates and to ensure they are not vulnerable to such attacks.

Read More »

Proactive Defense

A proper cybersecurity strategy consists of the right people, process and technology to effectively defend against today’s modern threats.

Reactive Services

If your data has been compromised or you suspect you are the victim of a data breach – take immediate action.

Security Services

CDG has successfully proven that an investment in cybersecurity can be a revenue generating activity, versus a cost center.

Incident Response

If you have been the victim of a cyber attack, contact us right now.