TCI Technologies Blog

Nick

Recent Posts

Azure Active Directory vs. Server Active Directory: Which is best for Business?

Categories: active directory, microsoft, what is active directory, Azure Active Directory

12 December

The names may be similar, but Windows Azure Active Directory and Windows Server Active Directory are far from the same thing. One of the two can almost definitely streamline your business’ operations, so you’ll want to learn the difference.

Continue Reading

6 Must-Know Computer Security Tips for Holiday Shopping

Categories: Cybersecurity, Holiday Shopping, Information Security

05 December

Hackers are no strangers to the fact that online holiday shopping is going to reach record levels this year. They know it’s the perfect opportunity to exploit unsuspecting consumers who are looking to find the best deals. Keep these computer security tips in mind to stay ahead of the crooks.

Continue Reading

What is a Firewall, and why should my Business have one?

Categories: Cybersecurity, What is a firewall, Firewall

28 November

Although it’s a vital cybersecurity device for both personal and business usage, we often find our clients asking us, “What is a firewall?” In this blog, we’ll discuss what firewalls are, and why every business, small or large, should have one.

Continue Reading

The 5 Best Amazon Alexa Skills for Business Productivity

Categories: amazon, Amazon Alexa

21 November

Digital assistants like Amazon’s Alexa, which is the persona associated with the Amazon Echo, have made existing technology even more convenient. They’re most often used in smart homes, but the Amazon Alexa Skills kit has many uses for the office as well.

Continue Reading

Are the new iPhone X Features really Worth the Money?

Categories: smartphone, apple, iPhone X

14 November

Every time a new iPhone or Android is released, people wonder if they’re worth the steep price. Apple’s newest, most expensive mobile device, the iPhone X, is no different. In this blog, we’ll help you determine whether the new iPhone X features are worth $1,000, or if you should stick to your current smartphone.

Continue Reading

How the Main Street Cybersecurity Act affects your Business

Categories: Cybersecurity, Information Security, Business

07 November

Cyberattacks can potentially cripple small businesses, the lifeblood of the American economy. For that reason, the United States Senate passed the Main Street Cybersecurity Act, which aims to reduce small business’ cybersecurity risks. Here’s what you need to know.

Continue Reading

What is an SSL Certificate, and does my Business Need one?

Categories: Cybersecurity, Information Security

24 October

If your business has a website, you have a responsibility to keep both your company’s and your customers’ personal information secure. One of the easiest ways to do this is by installing an SSL certificate to your website. What is an SSL certificate, you ask? We have the answer.

Continue Reading

How to Set up Rules in Outlook 2013 for Maximum Organization

Categories: Microsoft Outlook, microsoft outlook 2013

17 October

Between incoming and outgoing messages, your email can become a chaotic disaster in the matter of hours. Luckily, once you know how to set up rules in Outlook, your inbox will basically take care of itself.

Continue Reading

The Google Pixel 2: What should you Expect?

Categories: android phone, Android, Google Pixel 2

10 October

On October 4, the Google Pixel 2 and Pixel 2 XL were officially announced, although there were several leaks beforehand. Here’s what you should expect from the new version of Google’s flagship smartphone.

Continue Reading

Two Factor Authentication: is an App, Email or SMS Safest?

Categories: Cybersecurity, Information Security, Two Factor Authentication

03 October

Two factor authentication, also known as 2FA, is absolutely one of the best ways to protect your online accounts from hackers. However, since there are three main authentication methods, many people are left wondering: is it best to use an app, email or SMS message as an authentication factor?

Continue Reading