Welcome to G Squared Computing

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance.

Get Support Now

G Squared Computing was founded over a decade ago with the objective of providing the highest level, state of the art computing hardware and engineering services in the industry. Our forty plus years of combined experience with regard to hardware, software and engineering services has allowed G Squared to gain an intimate understanding of the industry.

With thousands of PC and file server builds and hundreds of implementations to our credit, The G Squared organization has the necessary experience to provide the equipment and engineering services unequaled anywhere in the industry. The companies and organizations affiliated with G Squared include every major player in the technology world. Intel, Microsoft, Dell, Lenovo, Netgear, HP to name just a few. These associations keep G Squared on the leading edge of development and technology which keeps our customers ahead of the technology curve.

  • Fortinet to Announce Second Quarter 2013 Financial Results

    Published: July 2013

  • Nine HIPAA Network Considerations

    Published: July 2013

  • Building a Secure Architecture with Cisco SAFE

    Published: June 2016

    The biggest challenge in securing companies today is complexity. Too many attacks, but also, too many defenses. And, they keep growing. Maddening.  But, there is a new security reference that simplifies this Herculean task. Cisco SAFE uses a model and a method to guide you. SAFE uses a model to organize the network into logical […]

  • Cisco TrustSec, the “Swiss Army Knife” in your network security toolbox

    Published: June 2016

    A new approach to segmentation that simply delivers more Network segmentation has been around for quite a while as a way to isolate environments and critical systems to secure data and IT assets. Recent breaches have highlighted the value of segmentation in reducing the attack surface and preventing the lateral movement of targeted malware. But […]

  • Detecting DNS Data Exfiltration

    Published: June 2016

    The recent discovery of Wekby and Point of Sale malware using DNS requests as a command and control channel highlights the need to consider DNS as a potentially malicious channel. Although a skilled analyst may be able to quickly spot unusual activity because they are familiar with their organisation’s normal DNS activity, manually reviewing DNS […]

  • Vulnerability Spotlight: LibreOffice RTF Vulnerability

    Published: June 2016

    Vulnerability discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing the presence of CVE-2016-4324 / TALOS-CAN-0126, a Use After Free vulnerability within the RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and superscript element causes […]

  • Microsoft announces Windows 10 anniversary update available Aug. 2

    Published: June 2016

    Read more »

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance. We can often provide relief via a simple, safe and secure remote session. If that isn't possible we can generally have a technician onsite the same day as your call is received.

Get Support Now