TCI Technologies Blog

4 Steps to Sending a Secure Email

Categories: email, security, email tips, Cybersecurity

24 January

As a businessperson, a hacked email can have devastating results. At best, the hacker sends a few spam emails to your contacts, tarnishing your reputation. At worst, sensitive information falls into the wrong hands. With the increasing number of hacking cases, knowing how to send a secure email is more important than ever.

Continue Reading

What is Two Factor Authentication?

Categories: security, Cybersecurity

06 September

Despite its techy-sounding name, two factor authentication is one of the simplest ways to keep your information secure online. But what is two factor authentication, exactly?

Continue Reading

How to Block Spam Emails From Creeping Into Your Inbox

Categories: email, security

11 April

You can easily learn how to block spam emails at in Outlook and Gmail. The different types of spam emails include unwanted marketing, phishing schemes that masquerade as friendly emails, and identity theft operations that request your user name, password and credit card information. Here are some helpful tips for how to block and report spam.

Continue Reading

How to Store Passwords to Keep Your Business Data Safe

Categories: security, tech tips

22 March


Did you know that 47 percent of the American population has had their personal information exposed by hackers? Or that a hacker could crack an eight-character lowercase passcode in only two hours? There is a solution: A password manager can reduce the chance of your valuable information being stolen by data thieves and provide you with peace of mind. Here are three tips on how to store passwords in order to prevent a data breach.

Continue Reading

The Most Controversial Hacking Cases of 2015

Categories: security, News, cyber security

11 November

controversial hacking cases of 2015

In 2015, as in past years, we’ve seen plenty of hacking cases that drew tons of attention from the media. From the celebrity iCloud hack to the scandalous data compromise of the Ashley Madison database, it’s been a busy year for hackers and security teams alike. So, without further ado, here are the most controversial hacking cases of 2015.

Continue Reading

The New Features of iOS9 You’ll Want Right Now

Categories: security, apple, iphone, new release

04 November

new features of iOS9

Soon after debuting the iPhone 6s, Apple has released a significant upgrade to its mobile operating system. With improvements across the board, the new features of iOS9 create an easier, more enjoyable experience.

Continue Reading

Do Your Part During National Cybersecurity Awareness Month

Categories: security, News

08 October

cyber security

Since the Internet is so prominent in the life of just about every American, President Obama has designated October as National Cybersecurity Awareness Month. Participating in National Cybersecurity Awareness Month will not only provide you with education about cybersecurity, but will give you the opportunity to educate others as well.

Continue Reading
FREE Mobile Security Checklist

Recent Posts