TCI Technologies Blog

A Brief Guide to PCI Compliance

Categories: Cybersecurity, PCI Compliance

17 April

The Payment Card Industry Data Security Standard (PCI DSS) binds all organizations that accept, transmit or store cardholder data. Failure to maintain PCI compliance may result in hefty fines and/or security breaches by hackers. Here are some ways to prevent that from happening.

Continue Reading

7 Reasons you need an IT Project Manager

Categories: IT Project Management

10 April

As a business owner, you don’t have the time to oversee the installation of new IT infrastructure. You’re busy running a company. By hiring an IT project manager, you can make sure everything runs smoothly, punctually and on-budget.

Continue Reading

HIPAA Compliance: A Basic Summary

Categories: cyber security, HIPAA Compliance

03 April

The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations protect the privacy of patients’ personal information. Maintaining HIPAA compliance requires several key cyber security measures.

Continue Reading

What is a Zero Day Exploit, and why is it so Dangerous?

Categories: Cybersecurity, Zero Day Exploit

27 March

Regardless of how many steps you take to secure your company’s network, it can still be at risk. That’s because of a type of attack known as a zero day exploit. Learn about this dangerous malware and what you can do to defend against it.

Continue Reading

Windows S Mode Set to Be Released in 2019

Categories: Windows 10, Microsoft Windows 10, Windows 10 Apps

20 March

In 2019, Microsoft will roll out a new option for the Windows 10 operating system. It’s called “Windows S Mode.” Here’s what we know about it so far.

Continue Reading

What are Vulnerability Scans and Penetration Testing?

Categories: cyber security, Penetration Testing

13 March

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber security practices like penetration testing and vulnerability scans can help keep your network safe.

Continue Reading

7 Reasons Structured Cabling is Important for Businesses

Categories: Structured Cabling, IT Infrastructure

06 March

Although much of business technology has gone wireless in recent years, structured cabling systems are still vital to your IT infrastructure. It’s the basis for all communication at your company.

Continue Reading

9 Things to know about the Samsung Galaxy S9

Categories: Android, Samsung Galaxy S9

27 February

Although few official announcements have been made about the Samsung Galaxy S9 and S9+, plenty of information has been leaked to the internet. Here’s what we know about Samsung’s newest flagship phone so far.

Continue Reading

Dropbox vs. Google Drive vs. OneDrive: Which is Best?

Categories: cloud backup, Dropbox vs. Google Drive vs. OneDrive, Cloud Storage, Data Storage

20 February

With several great options available, it can be tough to decide which cloud storage provider to use. We’ve pit Dropbox vs. Google Drive vs. OneDrive in a fierce battle to determine which is best.

Continue Reading

How to Avoid Social Engineering Scams

Categories: Cybersecurity, Social Engineering Scams

13 February

A 2017 Verizon study determined that 43 percent of cyberattacks were social engineering scams. Perhaps one of the scariest things about this type of attack is that firewalls, antiviruses and other software cannot guarantee protection from them.

Continue Reading