TCI Technologies Blog

Two Factor Authentication: is an App, Email or SMS Safest?

Categories: Cybersecurity, Information Security, Two Factor Authentication

03 October

Two factor authentication, also known as 2FA, is absolutely one of the best ways to protect your online accounts from hackers. However, since there are three main authentication methods, many people are left wondering: is it best to use an app, email or SMS message as an authentication factor?

Continue Reading

DDoS Attack Survival Guide: is your Business Prepared?

Categories: Cybersecurity, Information Security

11 July

Distributed Denial of Service (DDoS) can cripple a business’ internet and technology operations indefinitely. Even scarier, it’s almost impossible to prevent a DDoS attack from taking place. Mitigating their impact is all about response and recovery.

Continue Reading

5 Common Types of Viruses you Should Know About

Categories: virus protection, computer virus, Cybersecurity, Information Security

23 May

Computer viruses have been around since shortly after the internet’s inception. While virtually everyone is aware of their existence, few people are familiar with the types of viruses and how they harm the computers they infect.

Continue Reading

5 Commonly Overlooked Information Security Risks for Businesses

Categories: business security, personal information, Cybersecurity, Information Security

04 April

Many businesses are blissfully unaware of the information security risks that plague them. If you’ve never been stressed about the safekeeping of your business’ data, this blog may change that.

Continue Reading
FREE Mobile Security Checklist

Recent Posts