utilities
Total Technical Solutions
LGC offers cloud-based, business class antivirus software that helps detect, prevent, scan, and delete malware (malicious software) and viruses from a computer. The software runs automatically in the background to provide real-time protection against virus attacks. It is comprehensive virus protection to help protect your files and hardware from malware such as worms, Trojan horses, and spyware.
Antivirus
- Auto-Clean Feature Deletes Harmful Software
- Automatic Updates of New Types of Malware
- Fights Against Multiple Types of Malware
- Protection Across Multiple Applications
- Real-time Scanning for the Presence of Malware
LGC ONE Backup
- Backup Monitoring
- Check Backup Status on a Single Screen
- Easy to Read and Export Detailed Logs
- LGC Customer Support
- Simple Restoration of Files and Folders
- Yearly Data Verification and Letter from LGC Upon Completion
The need for an efficient backup and an equally effective recovery plan is now more important than ever. The time it takes to restore your data and the quality of that data is extremely important. Ensuring your office has a clean copy of your data saves time and money in the event your office experiences events requiring data recovery. While you may not be able to prevent the unavoidable from occurring, you can have a recovery strategy in place. LGC offers a cloud-based backup service named LGC ONE Backup. LGC ONE Backup combines your local and online backups into a single product. All the details of your backups are available in an easy-to-read interface, including when an individual file was last backed up or checking the status of backups. Restoring even a single file or folder is just as simple as locating a file in Windows. LGC will monitor your backups to confirm your cloud as well as local media (SSD Drives/Thumb Drives) backups were successful. Once per year, LGC will download a cloud backup of your LGC software to verify that it is valid and send you a letter upon completion. LGC customer support will answer questions or assist you if issues occur.
Cybercrimes are on the rise around the world and both personal identity and financial information theft continue to increase. It is critical to protect your office’s data from attack – both internal and external. LGC offers a cybersecurity threat monitoring service named Fortress. Fortress provides real-time visibility of suspicious behavior or unauthorized system changes on your network. Fortress uses an advanced monitoring and detection software that helps identify a broad range of attacks and places you in the position of preventing such activity instead of just reacting to the all too real consequences. This services allows LGC to react in real-time and notify you of attacks and assist in blocking those intrusions as well as assist you in operating system and program updates to help maintain overall computer and system health.
Fortress
- Advanced Monitoring and Detection Identifies a Broad Range of Attacks
- Audit or Insurance Questionnaire Assistance
- Behavior-Based Detection of Malicious Activity in Real-time
- Hardware Failure Notifications
- Isolation of a Computer Upon Threat Detection
- Ransomware Attack Protection and File Restoration
- System Performance Change Notifications
Sentry
- Added Protection with Second Layer of Security
- Easy to Use
- Fast Push Notifications
- Helps Meet Cyber Insurance Carrier Requirements
- Real-time Identity Authentication
LGC offers multi-factor authentication (MFA) service named Sentry. Sentry is powered by industry leader, Duo Security. Adding MFA to your office doesn’t have to be disruptive to your staff. Sentry is fast and easy to use. Multi-factor Authentication (MFA) requires you to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong identity and access security policy. Rather than just asking for a username and password, MFA requires one or more additional verification factors, which decreases the likelihood of a successful cyber-attack. Verifying your identity using a second factor (such as your phone or other mobile device) prevents anyone other than you from logging in, even if they know your password. Sentry adds a second layer of security, helping to keep your account secure even if your password has been compromised. Many cyber insurance carriers now have an MFA requirement in place and the remaining carriers will likely require MFA in the next few years. If your office plans to renew or purchase a cyber insurance policy, you may find MFA is a requirement for approval.