Articles

trojan attacks

Trojan Attacks

What are Trojan Attacks? In cybersecurity, a type of malware is called a Trojan horse or simply, a Trojan. Trojan attacks can come in many

Read More »
brute force

Brute Force Attacks

Brute Force Attacks Overview Have you ever forgotten the password for one of your accounts? Not wanting to click the “forgot my password” button and admit

Read More »
data encryption

Data Encryption

Data Encryption So much of what we do online during personal and work endeavors requires inputting personal information that must remain confidential and private. Whether

Read More »
data privacy

Defining Data Privacy

Defining Data Privacy A crucial subset in the world of data usage and protection is called data privacy. Data privacy is an incredibly important field

Read More »
sim swapping

SIM Swapping Attacks and Scams

What is SIM Swapping? Individuals and organizations are always encouraged to use multi-factor authentication methods, with one of the most popular choices being two-factor authentication

Read More »
Managed Vulnerability Reduction

What is Data Integrity?

What is Data Integrity? When speaking of data, most often refer to data protection and data security, but another important aspect of data is called

Read More »

Proactive Defense

A proper cybersecurity strategy consists of the right people, process and technology to effectively defend against today’s modern threats.

Reactive Services

If your data has been compromised or you suspect you are the victim of a data breach – take immediate action.

Security Services

CDG has successfully proven that an investment in cybersecurity can be a revenue generating activity, versus a cost center.

Incident Response

If you have been the victim of a cyber attack, contact us right now.