TCI Technologies Blog


Recent Posts

Windows S Mode Set to Be Released in 2019

Categories: Windows 10, Microsoft Windows 10, Windows 10 Apps

20 March

In 2019, Microsoft will roll out a new option for the Windows 10 operating system. It’s called “Windows S Mode.” Here’s what we know about it so far.

Continue Reading

What are Vulnerability Scans and Penetration Testing?

Categories: cyber security, Penetration Testing

13 March

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber security practices like penetration testing and vulnerability scans can help keep your network safe.

Continue Reading

7 Reasons Structured Cabling is Important for Businesses

Categories: Structured Cabling, IT Infrastructure

06 March

Although much of business technology has gone wireless in recent years, structured cabling systems are still vital to your IT infrastructure. It’s the basis for all communication at your company.

Continue Reading

9 Things to know about the Samsung Galaxy S9

Categories: Android, Samsung Galaxy S9

27 February

Although few official announcements have been made about the Samsung Galaxy S9 and S9+, plenty of information has been leaked to the internet. Here’s what we know about Samsung’s newest flagship phone so far.

Continue Reading

Dropbox vs. Google Drive vs. OneDrive: Which is Best?

Categories: cloud backup, Dropbox vs. Google Drive vs. OneDrive, Cloud Storage, Data Storage

20 February

With several great options available, it can be tough to decide which cloud storage provider to use. We’ve pit Dropbox vs. Google Drive vs. OneDrive in a fierce battle to determine which is best.

Continue Reading

How to Avoid Social Engineering Scams

Categories: Cybersecurity, Social Engineering Scams

13 February

A 2017 Verizon study determined that 43 percent of cyberattacks were social engineering scams. Perhaps one of the scariest things about this type of attack is that firewalls, antiviruses and other software cannot guarantee protection from them.

Continue Reading

5 Potential Business Applications of Blockchain Technology

Categories: Blockchain Technology

06 February

With the increasing popularity of Bitcoin and other cryptocurrencies, you’ve probably noticed the term “blockchain technology” being mentioned more commonly. Here’s what it means.

Continue Reading

What is a Bring your Own Device Policy?

Categories: Mobile security, Bring your Own Device

30 January

Since more and more businesses are allowing employees to use their own devices at the office and to work remotely from other locations, forward-thinking companies have begun issuing “bring your own device” policies. Here’s what that means.

Continue Reading

What is 5G, and what makes it so Special?

Categories: Wireless Internet, 5G

23 January

Mobile telecommunications seem to evolve with each new smartphone that comes out. The iPhone 8 is better than the 7, the Google Pixel 2 is better than the first version. The same goes for mobile internet—4G is better than 3G. Of course, 5G will be the best. In this blog, we discuss what is 5G, and why it will change the way we think about mobile internet usage.

Continue Reading

How to Delete Cookies and Clear Cache on your Web Browser

Categories: internet browser, web browsers, Cache, Cookies

16 January

Anyone who uses the internet (basically everyone) should know how to delete cookies and clear cache on their browser. If you’re unsure of what this means or don’t know how to do so, you’ve come to the right place.

Continue Reading