TCI Technologies Blog

Dropbox vs. Google Drive vs. OneDrive: Which is Best?

Categories: cloud backup, Dropbox vs. Google Drive vs. OneDrive, Cloud Storage, Data Storage

20 February

With several great options available, it can be tough to decide which cloud storage provider to use. We’ve pit Dropbox vs. Google Drive vs. OneDrive in a fierce battle to determine which is best.

Continue Reading

How to Avoid Social Engineering Scams

Categories: Cybersecurity, Social Engineering Scams

13 February

A 2017 Verizon study determined that 43 percent of cyberattacks were social engineering scams. Perhaps one of the scariest things about this type of attack is that firewalls, antiviruses and other software cannot guarantee protection from them.

Continue Reading

5 Potential Business Applications of Blockchain Technology

Categories: Blockchain Technology

06 February

With the increasing popularity of Bitcoin and other cryptocurrencies, you’ve probably noticed the term “blockchain technology” being mentioned more commonly. Here’s what it means.

Continue Reading

What is a Bring your Own Device Policy?

Categories: Mobile security, Bring your Own Device

30 January

Since more and more businesses are allowing employees to use their own devices at the office and to work remotely from other locations, forward-thinking companies have begun issuing “bring your own device” policies. Here’s what that means.

Continue Reading

What is 5G, and what makes it so Special?

Categories: Wireless Internet, 5G

23 January

Mobile telecommunications seem to evolve with each new smartphone that comes out. The iPhone 8 is better than the 7, the Google Pixel 2 is better than the first version. The same goes for mobile internet—4G is better than 3G. Of course, 5G will be the best. In this blog, we discuss what is 5G, and why it will change the way we think about mobile internet usage.

Continue Reading

How to Delete Cookies and Clear Cache on your Web Browser

Categories: internet browser, web browsers, Cache, Cookies

16 January

Anyone who uses the internet (basically everyone) should know how to delete cookies and clear cache on their browser. If you’re unsure of what this means or don’t know how to do so, you’ve come to the right place.

Continue Reading

How to Avoid Ransomware Attacks in 2018

Categories: Cybersecurity, Ransomware, Information Security

09 January

The frequency of ransomware attacks exploded between 2016 and 2017, and there’s no sign that they’re just going to disappear any time soon. Quite the opposite, actually: hackers are designing even more complex attacks that are harder to identify and remove. Use this information to understand how they work and avoid them.

Continue Reading

6 Technology Trends to Watch for in 2018

Categories: technology trends

26 December

Year after year, advancements in technology change the landscape of business. We decided to break down some technology trends we believe will dominate 2018.

Continue Reading

New York Cybersecurity Law: How to Comply

Categories: Cybersecurity, Information Security, Business, Laws

19 December

Since March 1, 2017, most businesses in New York State were required to implement a cybersecurity policy thanks to a New York cybersecurity law entitled 23 NYCRR Part 500. On February 15, 2018, affected businesses must submit their first compliance certification to the New York Department of Financial Services (NYDFS).

Continue Reading

Azure Active Directory vs. Server Active Directory: Which is best for Business?

Categories: active directory, microsoft, what is active directory, Azure Active Directory

12 December

The names may be similar, but Windows Azure Active Directory and Windows Server Active Directory are far from the same thing. One of the two can almost definitely streamline your business’ operations, so you’ll want to learn the difference.

Continue Reading