Welcome to G Squared Computing

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance.

Get Support Now

G Squared Computing was founded over a decade ago with the objective of providing the highest level, state of the art computing hardware and engineering services in the industry. Our forty plus years of combined experience with regard to hardware, software and engineering services has allowed G Squared to gain an intimate understanding of the industry.

With thousands of PC and file server builds and hundreds of implementations to our credit, The G Squared organization has the necessary experience to provide the equipment and engineering services unequaled anywhere in the industry. The companies and organizations affiliated with G Squared include every major player in the technology world. Intel, Microsoft, Dell, Lenovo, Netgear, HP to name just a few. These associations keep G Squared on the leading edge of development and technology which keeps our customers ahead of the technology curve.

  • Fortinet to Announce Second Quarter 2013 Financial Results

    Published: July 2013

  • Nine HIPAA Network Considerations

    Published: July 2013

  • Fortinet Announces Participation in Upcoming Investment Conferences

    Published: May 2016

    Fortinet Announces Participation in Upcoming Investment Conferences

  • Angler Catches Victims Using Phish as Bait

    Published: May 2016

    This post authored by Nick Biasini with contributions from Erick Galinkin. Exploit kits have been a recurring threat that we’ve discussed here on this blog as a method of driving users to maliciousness.  Users typically encounter exploit kit landing pages through  compromised websites and malvertising. However, we’ve found a new email twist to the standard […]

  • Threat Spotlight: Spin to Win…Malware

    Published: May 2016

    This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to malicious content is through malicious advertisements known as malvertising. Talos has […]

  • The Changing Face of the Healthcare Security Leader

    Published: May 2016

    If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security’ and manage a small staff of security administrators or […]

  • 5 Steps to an Effective Data Incident Response Program

    Published: May 2016

    All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at the critical processes […]

Need Answers Fast?

Call 858-715-3837 or email us for immediate assistance. We can often provide relief via a simple, safe and secure remote session. If that isn't possible we can generally have a technician onsite the same day as your call is received.

Get Support Now