PCG Tech Tuesdays

Join PCG President & Chief Technology Advisor, Dave Hodgdon with PCG Engineers and Security and Cloud Experts Steve Ripper and Roland Carter every Tuesday for new topics relevant to how Technology can help your business be more efficient and productive. Cyber security is top of mind with all businesses and our goal is to give you relevant content to help mitigate your risks to protect your data and reputation.

Each week PCG Engineers discuss the latest in Security, Cyber security, Cloud Computing, Microsoft 365, Business Continuity and Disaster Recovery options, Wireless, Remote Work Force, Surveillance, Training and more! Think of it as free advice from the Industry Leader in Business IT Service and Support.

Cyber Security Awareness Month and Seminars

CISSP (Certified Information Systems Security Professional)

Zero Trust and Application White Listing

Why MFA is important for Manfacturing companies

Security Training for your Business

Remote Work Force Standards

Moving Primary Business Applications to the Cloud

The Importance of Web Based Applications for Your Business

Backup ISP and Why Your Business Needs It

Cyber Insurance and What You Need to Know

How to Choose an ISP or Internet Service Provider

How to Choose a Managed Services and Security Provider

MFA – Multi Factor Authentication

Mobile Device Management and Security

EDR – Endpoint Detection and Response

Encryption – Email and Bitlocker on PCs

Notebook PCs – How to Get What’s Right for You

How to Work with Your IT Support Person

Risk Assessment and what it means for your Business

Password Management

Choosing a New Computer System

Security Awareness Training for your Company

Getting Ready for Video Conferencing Calls

Spoofing and Phishing Attacks

What Is NIST and Why Should You Care About It?

Why It Is A Good Time For Training

Your Phone System And What You Can Do Going Forward

Using The Tools Used For Working From Home In The Office

Microsoft 365 And What It Can Do For Your Business

Why You Need MultiFactor Authentication

How can a Managed Service Provider give your business the flexability you need

Improve Your Business Presence During These Times

How Companies Can Keep a Positive Outlook

Business Continuity in a Time Of Crisis

When to Engage Your IT Team for a Major Project

The Secret to Good Wireless

Continuing to Operate as a Business During Epidemics

How to Stay Connected While Still Isolated

Microsoft 365 Plans for your Business

MFA-Multifactor Authentication

Security Awareness Training

Advanced Antivirus/Malware Protection for Servers

The Dark Web

Productivity Tools for your business

What we are thankful for in IT

IT Planning and Budgeting

Social Media – What you need to know

Security awareness for your organization

How do you really know what is going on in your network infrastructure

What is ransomware

On boarding your company to an IT service provider

What do IT people like to see in their customers

A customers experience with PCG and why chose PCG?

Wireless everywhere and everything (access points for PCs and Laptops)


Where companies should purchase PCs and Laptops

What to do when nothing is working

Are you on track for your companies IT goals?

Top technology trends of 2019

The focus of tech training for your staff

Automation Tools for IT Management

Business Continuity and Backup

Cyber Security

End User Training

Microsoft Office 365

Microsoft Office 365

Windows 7 and Server 2008 End of Life

Network info structuring for your devices in your network

Monitoring Tools

Going Mobile

Winning Culture with IT

How to Work with your IT Dept

Security Cameras / Access

One Note

Social Media

Microsoft Azure

Why your business needs to start planning to be in Windows 10

Wireless, Controller Based, Coverage, Security

Microsoft Office 365, Email, Office, Encryption, Scammers “Phishing”

Cloud Computing, Cloud as a Service, Backup in the Cloud, Azure

Acceptable Use Policy, Password Policy, Ransomware, Firewall, Web Content and Filtering

Security 201: Dark Web “Passwords being Compromised”, Phishing

Business Continuity (Backup and Recovery)

Security 101: Password Policy, AV, Firewall, Email Filtering