TCI Technologies Blog

HIPAA Compliance: A Basic Summary

Categories: cyber security, HIPAA Compliance

03 April

The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations protect the privacy of patients’ personal information. Maintaining HIPAA compliance requires several key cyber security measures.

Continue Reading

What are Vulnerability Scans and Penetration Testing?

Categories: cyber security, Penetration Testing

13 March

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber security practices like penetration testing and vulnerability scans can help keep your network safe.

Continue Reading

5 Subtle Signs You’ve Fallen Victim to a Data Breach

Categories: computer security, cyber security, Data Breach

14 March

There’s a good chance you’re aware of how terrifyingly clever cybercriminals have become in the last few years. Unfortunately, they’re great at their jobs, meaning it’s possible for them to conduct a successful data breach of your business without you even realizing.

Continue Reading

How Secure is My Password? Probably not Secure Enough

Categories: TCI Tips, password protection, cyber security

03 February

When you think about the number of hacking cases we’ve seen over the years, it begs the question: how secure is my password? For most people, the answer is not as secure as you think. In fact, “123456” and “password” were the most commonly used of 2015. To make sure your greatest line of defense against cybersecurity disasters is as strong as possible, familiarize yourself with these best practices.

Continue Reading

Brush Up On Cyber Safety Before Holiday Shopping

Categories: safety, online shopping, cyber security

10 December

Online holiday shopping has become as much a tradition as caroling and tree decorating. In fact, consumers spent about $53 billion online during the 2014 holiday season. With all the money being spent, hackers and fraudsters have seized the opportunity to fatten their own wallets during the holidays. We’ve seen some serious hacking cases in 2015, and cybercriminals have shown no signs of slowing down. That’s why it’s important to have an understanding of cyber safety while you shop online.

Continue Reading

The Most Controversial Hacking Cases of 2015

Categories: security, News, cyber security

11 November

controversial hacking cases of 2015

In 2015, as in past years, we’ve seen plenty of hacking cases that drew tons of attention from the media. From the celebrity iCloud hack to the scandalous data compromise of the Ashley Madison database, it’s been a busy year for hackers and security teams alike. So, without further ado, here are the most controversial hacking cases of 2015.

Continue Reading

Windows XP Security under Threat from Cyber-Criminals

Categories: IT support, News, cyber security

31 March

The last few grains of sand in Windows XP’s hourglass are beginning to run out, and one group in particular sits eagerly awaiting the discontinuation of the old operating system. Eventually, the OS will stop receiving security updates; updates that keep you and your system safe from cybercriminals and hackers. On April 8th, those defenses will be gone and 500 million PCs that run everything from ATMs to your business will be exposed.

Continue Reading

Password Security in Light of Kickstarter Hackers

Categories: News, cyber security

19 February

There has been a recent surge in hacker activity; it seems like every week we get news of another security breach into the customer database of big-name companies. On Saturday, the crowd-funding site Kickstarter sent out an email to all registered users, and posted a blog on their website, notifying users of a security breach that occurred Wednesday night. Kickstarter was notified by law enforcement officials that their data had been compromised, and the immediately closed the breach and strengthened their security measures.

Continue Reading