Skip to content
(516) 484-5151
FacebookTwitterInstagramGoogle+Linkedin
TCI Technologies
Your Long Island IT Support Company
TCI Technologies
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact
  • About
    • Community Commitment
    • Jobs
    • Technology Partners
  • Industries
  • Cloud IT Services
    • Disaster Recovery as a Service
    • Desktop Virtualization as a Service
    • Hosted VOIP & Cloud Office Phone Systems
    • Platform as a Service
    • Software as a Service
    • Office 365 Backup
  • Managed IT Services
    • Data Backup Management
    • IT Help Desk Support
    • IT Vendor Management
    • Onsite IT Support
    • Virtual CTO
    • Quantum Support
  • IT Project Management
    • IT Office & Network Relocation Services
    • IT Vendor Management
    • Structured Cabling
    • Web Development
    • Wireless Networks
  • Cyber Security Solutions
    • AntiVirus & Web Protection
    • Behavior Monitoring
    • Email Security
    • Penetration Testing
    • Asset Discovery
    • Disaster Recovery & Data Protection
    • Intrusion Prevention System (IPS)
    • Vulnerability Scans
  • Blog
  • Contact

Author Archives: Aaron Mattson

5 Windows 10 Apps Worth a Spending a few Bucks on

Microsoft Windows 10, Windows 10 AppsBy Aaron MattsonApril 25, 2017Leave a comment

There’s no real risk in downloading free Windows 10 apps because you can always uninstall the ones you dislike. But when it comes to apps that cost money, you’ll want to make sure they provide enough bang for their buck.

The Top 4 Most Terrifying Computer Viruses

computer security, computer virus, Cybersecurity, RansomwareBy Aaron MattsonApril 18, 2017Leave a comment

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware and ransomware were created. This time, we’re going to strictly discuss the world’s most horrifying computer bugs.

Samsung Galaxy S8 Release Date, Features and More

Android, Samsung Galaxy S8, smartphoneBy Aaron MattsonApril 11, 2017Leave a comment

At long last, the Samsung Galaxy S8 is ready to hit the market. In this blog, we’ll discuss our favorite features of the newest Galaxy as we excitedly anticipate its release. Let’s begin!

5 Commonly Overlooked Information Security Risks for Businesses

business security, Cybersecurity, Information Security, personal informationBy Aaron MattsonApril 4, 2017Leave a comment

Many businesses are blissfully unaware of the information security risks that plague them. If you’ve never been stressed about the safekeeping of your business’ data, this blog may change that.

Ransomware Attacks now Target Remote Desktop Protocol

Cybersecurity, malware, RansomwareBy Aaron MattsonMarch 30, 2017Leave a comment

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But recently, ransomware attacks have utilized a new point of entry to victims’ computers: Microsoft’s Remote Desktop Protocol.

The 5 Wildest Computer Hacking Cases of All Time

Cybersecurity, Hacking CasesBy Aaron MattsonMarch 28, 2017Leave a comment

Time and time again, we see high-profile hacking cases popping up in the media. Cybersecurity is clearly an issue for businesses of all shapes and sizes, as well as individuals. In this blog, we’ll take a look back at some of the most controversial examples of hacking that have ever happened.

How Outsourced Tech Solutions Can Help your Business

IT support, Outsourced IT, Tech SolutionsBy Aaron MattsonMarch 21, 2017Leave a comment

If your business depends on technology to ensure smooth operations, you know how stressful and inconvenient it is when that technology malfunctions. Whether your infrastructure is faulty, your software is slow or you’ve suffered a data breach, outsourcing whoever’s in charge of your tech solutions is likely what your business needs.

5 Subtle Signs You’ve Fallen Victim to a Data Breach

computer security, cyber security, Data BreachBy Aaron MattsonMarch 14, 2017Leave a comment

There’s a good chance you’re aware of how terrifyingly clever cybercriminals have become in the last few years. Unfortunately, they’re great at their jobs, meaning it’s possible for them to conduct a successful data breach of your business without you even realizing.

The 7 Sweetest Features of Android Nougat

Android, Android Nougat, android phoneBy Aaron MattsonMarch 7, 2017Leave a comment

The staggered release of Google’s latest and greatest operating system to Android devices has been frustrating for many, to say the least. But, as more and more devices receive the Android Nougat update, it pays to know what its best features are.

5 Cool Features of Microsoft Edge

Microsoft Edge, Windows 10By Aaron MattsonFebruary 28, 2017Leave a comment

While browsers like Chrome, Firefox and Safari have rightfully forced Internet Explorer into obscurity, the relatively-new Microsoft Edge is not to be slept on. And we’re about to tell you why.

1
2345678910111213141516
…1718192021…
222324252627
28
© TCI Technologies 2023 | Web Design by Fat Guy Media | Privacy Policy
Go to Top