Tel | 303-920-9472
Email | info@dcncinc.com
Social |        twittershaded  

DCNC, Inc Blog

This category contains general information about DCNC services.

Gene, Gene the DCNC Tech Machine

Gene, Gene the DCNC Tech Machine

“(Gene) did a great job today.  He is so easy to work with and he gets it.  Good guy.  Don’t lose him.” That's what our client at Davis and Ceriani had to say about Gene Essman.  Gene has been a Field Tech with DCNC since 2018, after working for some pretty big names in the corporate world, like Coors Brewing Company.

Continue reading
364 Hits

Tags:

We All Share this One Single Planet Earth

We All Share this One Single Planet Earth

We All Share this One Single Planet Earth…

Continue reading
354 Hits

Tags:

Microsoft Office 2019

Microsoft Office 2019

If you're not on Office365, you may be curious about  the newest release of Office from Microsoft. Here’s what you need to know for now:

Continue reading
765 Hits

Tags:

Why the Marriott breach puts YOUR firm’s security at risk

Why the Marriott breach puts YOUR firm’s security at risk

 Wait…. Affects the firm’s security??  Our firm doesn’t ever stay at a Marriott or an SPG hotel, so surely we are not at risk…. are we??  Unfortunately, the truth is that yes, your firm’s data is still at risk, and now more than ever.  Even if as a company you always stay somewhere else.  Even if your company never travels for business.  Why? How??  Let’s dive in and take a look

Continue reading
558 Hits

Tags:

Spam, Spam, Spam, Spam...

Spam, Spam, Spam, Spam...

So, one morning, you log onto your computer, open your email, and find yourself staring at a bunch of undeliverable emails in your Inbox.  These emails were created and sent from your computer, or so it seems, and have bounced back from yonder destinations......giving you your first clue that your email account has been compromised.

Continue reading
555 Hits

Tags:

I know what you've been doing...

I know what you've been doing...

Now that we have your attention...  

Continue reading
1007 Hits

Tags:

7 Red Flags to Reduce Cyber Attack

7 Red Flags to Reduce Cyber Attack

John Podesta fell for a phishing attack, which led to the release of a decade’s worth of emails. The hacker posed as Google and alerted Podesta to change his password because of suspicious activity on his account. By clicking on the link within the email, hackers were granted full access to his inbox.

Continue reading
1019 Hits

Tags:

Are you doing everything you can to protect your work and personal data?

There has been a lot of publicity around the WannaCry Ransomware virus and we wanted to highlight some steps that everyone should take to ensure that they are doing their due diligences to prevent these types of malware infections at work and at home.

Continue reading
1277 Hits

Meet Our Team: Matt Herm

Meet Our Team:  Matt Herm

Matt recently joined DCNC as our Trainer and Application Support Specialist. He has over 15 years of experience working in law firms and corporate legal departments and jokingly claims to have been “everything but an attorney!”

Continue reading
1529 Hits

Meet Our Team: Lauren Wood

Meet Our Team: Lauren Wood

Lauren is DCNC’s Office Administrator- you may recognize her name from her monthly invoice emails!

Continue reading
1863 Hits

Why Business Continuity?

Why Business Continuity?

What would happen to your business if your server crashed and did not come back up? 

Continue reading
1473 Hits

Meet Our Team: Sam Granado

Meet Our Team: Sam Granado

Field Engineer Sam the Man!

Continue reading
1576 Hits

Your IT Health: Remote Monitoring and Maintenance

Your IT Health: Remote Monitoring and Maintenance

Staying Ahead of Trouble

Continue reading
1486 Hits

WEAR your Data!

WEAR your Data!

Yep, you read that correctly. But no, it’s not what you think. It’s not a goofy jacket, a new watch, computer glasses, or a Virtual Reality headset. W.E.A.R. actually stands for Worldox Encryption at Rest. WEAR is one of the many amazing and very timely additions coming soon to the award-winning Worldox document management system. Being able to encrypt your data at rest (while not in use) is an important added layer of security in today’s world.

Continue reading
1882 Hits

Welcome to the DCNC blog!

Welcome to the DCNC blog!

DCNC has decided to begin producing a blog to highlight advances and trends in the IT industry, as well as updates about the company itself. You can expect a few posts a month where we will provide our opinions and insights into current market trends along with others to tell you about where our company is headed and what we’ve been up to. Be sure to check in at least once a week to see if we have any new updates that might be interesting to you!

Continue reading
2017 Hits

Partners

  • 2019-20_MileHigh_Legal_Admin_Logo54.jpg
  • Cisco-umbrella.png
  • citrix.jpg
  • clio5.png
  • continuum-new-logo-01.jpg
  • Dell.jpg
  • Dropbox.png
  • DropboxBusiness.png
  • ID-Agent-image-small-00109127xA19B9.png
  • infrascale-logo1.png
  • Ingram-logo.jpg
  • Logo-Horizontal.jpg
  • Logo-Negative.jpg
  • logo_barracuda_main_for-light-backgrounds.jpg
  • med-ConnectWise-master.jpg
  • MetaJure_Logo_RBG_May_2018_00112681xA19B9.png
  • Microsoft-Partner-Silver-Small---Midmarket-Cloud-solutions-logo.jpg
  • msp501-winner-badge.png
  • SIC_2019_.png
  • SkyKick-logo.jpg
  • small_business_excellence_awards.gif
  • SonicWall_Registered-2C.jpg
  • Trumpet-Inc.jpg
  • Veeam-propartner_logo.jpg
  • VeritasFeatured2.png
  • webroot-logo.jpg
  • WebrootChannelEdgesm.jpg
  • Webroot_EP_Certification_TECH_PRINT.jpg
  • workshare.jpeg
  • Worldox2019.jpg